N

[Previous] [Next]

Nagle’s algorithm

An algorithm used in implementations of TCP/IP that controls traffic congestion on a network. Nagle’s algorithm limits transmission of small datagrams and controls the size of the Transmission Control Protocol (TCP) sending window. The algorithm increases the efficiency of routers by reducing the latency of the routing process. It is also an important mechanism for enabling large internetworks such as the Internet to handle TCP/IP applications (such as Telnet applications) that communicate using large numbers of small Internet Protocol (IP) packets.

For example, consider a Telnet client communicating with a Telnet server. When a user types a single character in the Telnet client window, TCP packages the character and sends it to the server as a very small packet. It would be highly inefficient if each character typed into a Telnet window were sent as an individual packet. In fact, when the user types the next character, one of two things can happen:

  • If an acknowledgment has been received for the first packet sent, TCP packages the second character into a second small packet and sends it immediately to prevent delay.

  • If an acknowledgment has not been received for the first packet, TCP buffers the second character, then the third, and so on until the acknowledgment is received or the buffer has reached a certain size, triggering TCP to package the buffered characters and send them. This is a result of Nagle’s algorithm being implemented on the client TCP/IP protocol stack. The process of buffering the TCP send buffer is sometimes called “nagling.”

Another part of Nagle’s algorithm addresses the problem of a network system getting bogged down when a large datagram is sent over and over again because it takes too long to fill a sending window (the receiving buffer) with the data from the datagram. According to the algorithm, when a client receives a message that datagrams are being dropped because of congestion at a particular host, the client responds by temporarily acting as if the host’s window size has been reduced. This “throttles back” the amount of information sent to the host and enables the host to catch up.

NOTE


Nagle’s algorithm is defined in Request for Comments (RFC) 896. It is implemented in the TCP/IP protocol stack of the Microsoft Windows NT and Windows 2000 operating systems. Proposals have been put forth for improving this algorithm because it does not produce optimal results with certain kinds of TCP/IP interactions, such as those based on HTTP 1.1.

named pipe

An interprocess communication (IPC) mechanism that provides reliable, connection-oriented, two-way communication between processes on two computers. Named pipes are one form of client/server communication in Microsoft Windows operating systems and applications.

How It Works

A pipe is a portion of memory reserved for one process to pass information to another. Named pipes are implemented as file system drivers and therefore are opened by requests made from the redirector. They take full advantage of the features of file system drivers, such as security and validation.

Developed originally for Microsoft OS/2 LAN Manager and maintained in recent versions of Windows for backward compatibility, named pipes provide guaranteed delivery of data between computers for distributed applications in a client/server environment. They provide a reliable, one-to-one, bidirectional, connection-oriented form of communication between a client process running on one machine and a server process (service) running on a different machine.

Named pipes are used in the WinLogon process on Windows NT and in client/server applications that use Microsoft SQL Server.

NOTE


Windows 98 supports client-side named pipes communication for backward compatibility with OS/2 LAN Manager and other applications, but it does not support server-side named pipes. Named pipes consume more server-side memory than other IPC mechanisms (such as Windows Sockets) and generate a bit more network traffic.

name lookup

In the Domain Name System (DNS), the process of a resolver sending a request to a name server. The resolver sends the host name of a TCP/IP host on the internetwork, and the name server returns the host’s IP address. The name server is said to “resolve” the name of the host into its associated IP address.

The query sent by the resolver to the name server is most often a recursive query, which returns either the expected IP address or an error. This type of query makes it possible for a name server to forward the request on to other name servers if it can’t resolve the name and then return the result of that request to the resolver. If the queried name server is configured to forward requests, it can perform an iterative query, querying several name servers in succession until it resolves the name or runs out of name servers to query.

See also Domain Name System (DNS), host name resolution

name resolution

The process of resolving the name of a computer on a network into its network address. Name resolution is an important part of network communication because the logical names of hosts on the network must be resolved into their network addresses before communication can take place.

TCP/IP networks running Microsoft Windows operating systems support two name resolution methods:

In addition, once the name of a host is resolved into its IP address, the TCP/IP protocol called Address Resolution Protocol (ARP) resolves the host’s IP address into its physical layer or MAC address. Once the name resolution process is complete, you can place frames on the network with appropriate destination MAC addresses so that they can be received by their destination host.

See also host name resolution, NetBIOS name resolution

name server

A host on the Internet or on a TCP/IP internetwork that can be used to resolve host names into IP addresses. Name servers are an essential component of the Domain Name System (DNS), which provides the namespace of all hosts on the Internet or on a private TCP/IP internetwork. Because of name servers, when you want to access or reference a host on a TCP/IP network, you can use its friendly DNS name instead of its IP address, which is generally harder to remember.

How It Works

The DNS functions as a client/server-based system, with name servers forming the server part and resolvers forming the client part. Each name server has authority over a portion of the DNS namespace called a zone, which means that it should be able to resolve name lookups for hosts located within that zone. Resolvers send name lookups to name servers by passing them the name of a host. The name server performs name resolution by determining which IP address corresponds to the requested host’s name. Name servers can also query each other, so a typical name lookup from a resolver might involve several name servers.

This distributed system of name servers makes it possible to share the load of name resolution among many computers. Just imagine if one machine had to track the name of every host on the Internet!

Within a zone you can have two types of name servers, which allows for fault tolerance and a further sharing of the load:

The collection of all name servers on the Internet is used to manage and maintain the DNS namespace of host name to IP address mappings. Name servers can also be used on private TCP/IP internetworks to facilitate network communication.

NOTE


Microsoft’s implementation of a name server in Windows NT, the Microsoft DNS Service, is fully compliant with related Requests for Comments (RFCs) describing the implementation and working of the DNS.

Windows 2000 supports the industry’s extension to DNS with the DNS dynamic update protocol. This protocol is integrated into Active Directory on Windows 2000–based networks and enables the dynamic updating of DNS name servers.

See also Domain Name System (DNS)

name server (NS) record

A type of Domain Name System (DNS) resource record that identifies the specific host as a name server. For each zone governing a portion of the DNS namespace, there should be one name server (NS) record for each name server in the zone. Each NS record also requires an associated address record that resolves the host name of the name server into its IP address. The syntax for the NS record is specified in Request for Comments (RFC) 1035.

Here is an example of an NS record:

 microsoft.com.      IN  NS      nameserver2.microsoft.com. 

In this example, the domain microsoft.com is within the zone of authority of the name server named nameserver2. IN stands for Internet, and NS stands for name server.

See also Domain Name System (DNS)

namespace

The abstract space or collection of all possible addresses, names, or identifiers of objects on a network, internetwork, or the Internet. A namespace is “the space of all names” for a given type of network name.

A simple example of a namespace is an IP address space, which consists of the space of all possible IP addresses. This space is divided into class A, class B, and so on, which represent disjoint subgroups of the IP address space. Generally, every node on a TCP/IP network, internetwork, or the Internet must occupy a unique point in the IP address space—that is, it must have a unique IP address. This ensures that a packet directed to a particular node (such as a computer, network printer, or router interface) can be addressed with the IP address of that node. If two nodes on a network were to have the same IP address number, a packet intended for one might end up at the other. The exception is when you have a private network connected to the Internet through a firewall that uses network address translation (NAT) or some other scheme to hide the addresses of nodes in the private network from the Internet. In this case, if no direct communication is expected between nodes in the two networks (except through the firewall), nodes in the private network can be assigned arbitrary IP addresses such as 10.x.y.z.

Another common example of a namespace is the DNS namespace of the Internet. Unlike the space of IPv4 addresses just described, the DNS namespace is hierarchical in structure and arbitrarily scalable (except so far as a node in DNS namespace must generally map to some specific IP address). It also has the advantage of being a logical naming scheme, in contrast to a physical naming scheme such as IP addresses, which are bound to the particular network structure being used.

The root of the DNS namespace branches out to a relatively small number of top-level domains such as .com, .org, and .edu. Private companies can register a domain name in one of these top-level domains and then subdivide their branch of the DNS namespace as they desire. For example, a company named Carpoint Traders might register the domain name carpoint.com and then create three new subdomains under it named sales.carpoint.com, support.carpoint.com, and hq.carpoint.com. Specific servers and router interfaces exposed to the Internet might then be given specific DNS addresses to uniquely identify them in the DNS namespace. An address in the DNS namespace, called a fully qualified domain name (FQDN), maps to a unique node on the Internet. An example might be widgets.support.carpoint.com, which might map to the address 10.15.6.133. Names of domains, subdomains, and individual hosts are maintained on name servers located at various points across the Internet or within large private internetworks. If you want to locate a particular node in the DNS namespace, you query a name server. The process of locating a particular DNS node and resolving its FQDN into its associated IP address is called name resolution.

Another namespace used in Microsoft Windows NT–based and Windows 2000–based networks is the NetBIOS namespace, which is the space of all NetBIOS names (computer names) of Windows machines on the network. Unlike the hierarchical tree structure of the DNS namespace, the NetBIOS namespace is flat and is managed using the Windows Internet Name Service (WINS), which runs on WINS servers in the network. Because the NetBIOS namespace is flat, it is not as scalable as DNS. For example, say that you query a name server to resolve an FQDN such as widgets.support.carpoint.com into its associated IP address. The name server might first have to find another name server that is authoritative in the carpoint.com domain. Next, the name server must find a name server that is authoritative in the support.carpoint.com subdomain whose database contains a record for the widgets.support.carpoint.com host. Finally, the name server must resolve the information in the record into an IP address. The whole process might take only several referrals and a short inspection of a relatively small database of resource records because each name server on the Internet is authoritative over only a small portion of the DNS namespace. Once you locate the correct name server through a series of hierarchical queries, the final name lookup deals with only a small number of records. The NetBIOS namespace is different, however, because each WINS server maintains a database of records for all NetBIOS names on the network. So if you were to use WINS to manage a network the size of the Internet with its millions of hosts, each WINS server would have a flat-file database containing millions of records, which would need to be searched from top to bottom each time a query was issued against it.

Because of the flexibility and scalability of DNS and its association with the Internet, DNS is the primary naming system used by Windows 2000. Support for WINS is included only for backward compatibility with downlevel Windows NT stations and legacy Windows stations. Active Directory in Windows 2000 uses DNS as the service for name resolution (for locating users, groups, computers, shared folders, printers, and other objects on the network). The namespace of Active Directory represents a bounded area within which the DNS name of the root of Active Directory is translated to all the objects within the directory. Within Active Directory, a domain tree represents a contiguous namespace of connected objects, while a domain forest is a disjointed namespace formed from two or more domain trees. Companies with Windows 2000–based networks can use the same DNS namespace for both internal and external network connections, or they can use separate DNS names for the network from an internal or an external perspective.

See also Domain Name System (DNS), IP address

naming context in Active Directory

A contiguous subtree or branch of Active Directory in Microsoft Windows 2000. Naming contexts are used to partition the Active Directory namespace into sections, each with its own security boundary. You use naming contexts during the process of directory replication to form the basic unit of the replication process.

Active Directory always includes at least three naming contexts:

During multimaster replication of Active Directory, any naming context that has been updated is replicated to other domain controllers. For example, if the schema is modified on one domain controller, the schema naming context is replicated to all other domain controllers in Active Directory and also to the global catalog server. Only those portions of the naming context that have changed are actually replicated.

naming context in Exchange Server

A boundary for permissions inheritance. Microsoft Exchange Server has three levels of naming context:

If permissions are assigned to a user or a group on the site container, those permissions are inherited by everything in the Exchange directory hierarchy beneath the site container until the configuration container is encountered. Similarly, if an object in the configuration container has permissions assigned to it, those permissions are inherited by all objects beneath it.

naming convention

A rule to ensure that users on a network have their own unique username so that they can be owners of their own resources (such as their personal folders). A simple and consistent naming convention for users on your network is an important part of network administration. Examples of naming conventions applied to the user Jeff Smith might include the following:

Two users on a network might have the same first or last name, so your naming convention should include a rule to break ties. For example, if Jeff Smith is “jsmith,” James Smith might be “jsmith2.” You might also want to establish a rule for easily identifying temporary employees, such as “T-jsmith” or “jsmith(temp).”

NOTE


On Microsoft Windows 2000–based networks, usernames of domain user accounts must be unique within the given organizational unit (OU) in which they are created in Active Directory. Usernames can be more than 20 characters long, but only the first 20 characters are used as logon credentials.

NAP

See Network Access Point (NAP)

NAS

See network access server (NAS)

NAT

See network address translation (NAT)

National Electric Code (NEC)

A series of specifications for protecting commercial and residential buildings from electrical hazards. The National Electric Code (NEC) is published by the National Fire Protection Association (NFPA), an international organization that advocates standards for fire safety and related issues. The NEC is one of hundreds of standards documents produced by the NFPA. The NEC, which is NFPA standard number 70, deals with how to properly install and maintain electrical and electronic equipment in order to minimize fire hazards. In the area of computer networking, the NEC covers the proper installation and construction of copper cabling and fiber-optic cabling, as well as issues relating to the powering of network devices, such as proper grounding.

The NEC is legally enforced in every state in the United States and in a number of other countries. Most U.S. municipalities have adopted NEC recommendations in local building codes. Testing of electrical equipment for compliance with NEC standards is performed by Underwriters Laboratories (UL).

On the Web

NFPA home page : www.nfpa.org

National Institute of Standards and Technology (NIST)

A government organization that provides services and programs to help U.S. industries commercialize new technologies and compete internationally. National Institute of Standards and Technology (NIST) certification identifies technologies as meeting federal government requirements.

In the area of relational database management systems (RDBMS’s), NIST administers a test named Federal Information Processing Standard (FIPS) 127-2. FIPS 127-2 is based on the broader American National Standards Institute (ANSI) SQL92 standard, which ensures portability across heterogeneous RDBMS’s by establishing a common set of structured query language (SQL) commands. There is no higher standard for SQL database languages than FIPS 127-2.

Microsoft SQL Server 6.5 was the first RDBMS to pass the NIST version 5.1 validation tests for Entry Level FIPS 127-2. SQL Server 6.5 complies with both the ANSI SQL92 standard and the FIPS standards.

native mode

A domain mode for running Microsoft Windows 2000 domain controllers that is incompatible with domain controllers running the earlier Windows NT operating system. You can use domain controllers running in native mode only to authenticate users on a pure Windows 2000–based network. If your network contains a mixture of Windows 2000 and Windows NT computers, you should configure your Windows 2000 domain controllers to run in mixed mode so that they can interoperate with Windows NT domain controllers. If you plan to use native mode, all domain controllers must be running Windows 2000 and must be configured to run in native mode, but member servers and client workstations can run either Windows 2000 or Windows NT.

NOTE


Native mode gives you more options than mixed mode regarding types of groups. Specifically, you can use global groups, domain local groups, and universal groups, and you can nest them to any degree. Running in mixed mode means that universal groups are not available, and you can nest global groups only in domain local groups and only to one level of nesting.

TIP


Windows 2000 domain controllers install in mixed mode by default. You can use the administrative tool Active Directory Domains and Trusts to change your domain controllers from mixed mode to native mode. If you change a domain controller to native mode, you cannot change it back to mixed mode, so don’t make the change until all your domain controllers are running Windows 2000.

See also domain modes

NBF

See NetBEUI Frame (NBF)

NBNS

See NetBIOS Name Server (NBNS)

nbtstat

A TCP/IP utility that displays current TCP/IP connections and statistics using NetBIOS over TCP/IP (NetBT). Nbtstat is installed on a computer running Microsoft Windows when the TCP/IP protocol stack is installed. You can run nbtstat from the command prompt to view NetBT statistics on the computer and determine the status of connections formed to the machine. You can also use nbtstat to preload #PRE entries in an Lmhosts file into the NetBIOS name cache and view the NetBIOS name and NetBIOS scope ID of a machine.

Example

nbtstat -n shows the NetBIOS names of the host that have been registered on the system; nbtstat -c displays the current contents of the NetBIOS name cache, which contains NetBIOS name to IP address mappings for other hosts on the network.

TIP


Nbtstat is useful for troubleshooting NetBIOS name resolution problems. You can run nbtstat -a < ComputerName > to obtain the local NetBIOS name table on <ComputerName> and its MAC address.

NDIS

See network driver interface specification (NDIS)

NDS

See Novell Directory Services (NDS)

near-end crosstalk (NEXT)

A measurement of the ability of cabling to reject crosstalk. Crosstalk is an undesirable condition in which the signals traveling through adjacent pairs of wire in twisted-pair cabling interfere with each other. Near-end crosstalk (NEXT) measures the ability of a cable to reject crosstalk between pairs of wire at the near end of the circuit. The pair causing the interference is called the “disturbing pair,” while the pair experiencing the interference is the “disturbed pair.” Channel NEXT is the NEXT value measured between one wire pair and another in the same cable; it is measured at both ends of the wire.

The NEXT value for a given cable type is typically expressed in decibels per 1000 feet and varies with the frequency of transmission. The higher the NEXT value, the greater the cable’s ability to reject crosstalk at its local connection. For example, the specifications for category 5 cabling include the minimum NEXT values shown in the following table. Note that the NEXT value generally decreases with increasing frequency, indicating increasing interference due to crosstalk at higher frequencies.

graphic n-1. near-end crosstalk (next).

Graphic N-1. Near-end crosstalk (NEXT).

The NEXT types are as follows:

Desired Data Rate and the Cable’s Minimum NEXT Value

Frequency Minimum NEXT Value

4 MHz

53 dB/1000 feet

10 MHz

47 dB/1000 feet

20 MHz

42 dB/1000 feet

1000 MHz

32 dB/1000 feet

TIP


To minimize NEXT in installations of category 5 cabling, do not expose more than 2 inches of wire pairs at the termination point of the cable (the patch panel, wall plate, or RJ-45 connector). Also, do not untwist the wire pairs more than half an inch.

NEC

See National Electric Code (NEC)

NetBEUI

Stands for NetBIOS Extended User Interface, a networking protocol developed by IBM and Microsoft in 1985 that is used for workgroup-size local area networks (LANs) with up to 200 stations. NetBEUI is an extension of the NetBIOS protocol.

NetBEUI was the primary protocol for LAN Manager and Windows for Workgroups. It is a fast and efficient protocol with low overhead that supports both connection-oriented communication (such as communication for mapping drives using the Net Use command and starting services remotely using the Net Start command) and connectionless communication (such as communication for sending datagrams, registering NetBIOS names, and performing NetBIOS name resolution).

NetBEUI is also self-tuning and implements flow control and error detection. It defines a framing mechanism at the transport layer and implements the LLC2 protocol of the Open Systems Interconnection (OSI) reference model for networking.

NOTE


NetBEUI is supported by all Microsoft Windows network operating systems; its implementation on Windows NT is called the NetBEUI Frame (NBF) protocol.

TIP


NetBEUI relies more heavily on broadcast packets than do the TCP/IP and NWLink IPX/SPX-Compatible Transport protocols; you should therefore use it only on smaller networks sized for workgroups. Because NetBEUI is a single-part naming scheme, it is a nonroutable protocol and is generally unsuitable for wide area networks (WANs).

NetBEUI Frame (NBF)

An enhanced implementation of the NetBEUI protocol that is available on Microsoft Windows NT operating systems. Some of the enhancements and special features of NetBEUI Frame (NBF) include the following:

NOTE


Although NetBEUI is essentially a nonroutable protocol, NBF supports Token Ring Source Routing on IBM Token Ring networks.

See also NetBEUI

NetBIOS

Stands for Network Basic Input/Output System, a specification created by IBM and Microsoft that allows distributed applications to access each other’s network services independent of the transport protocol used.

NetBIOS provides network input/output services to support client/server applications on a network. From an architectural viewpoint, the NetBIOS specification defines two things:

NetBIOS has more overhead than other IPC mechanisms. NetBIOS can take different forms depending on the network protocol on which it is running. The following table lists some common network protocols and the form that NetBIOS takes on each.

NetBIOS Protocol Stacks

Network Protocol Name When Combined with NetBIOS

NetBEUI

NBF (NetBEUI Frame protocol)

NWLink IPX/SPX-Compatible Transport

NWLink NetBIOS

TCP/IP

NetBT (NetBIOS over TCP/IP)

See also NetBIOS name resolution, P-node, Windows Internet Name Service (WINS)

NetBIOS name

A 16-byte name for a networking service or function on a machine running Microsoft Windows NT. NetBIOS names are a more friendly way of identifying computers on a network than network numbers and are used by NetBIOS-enabled services and applications. NetBIOS names are used by Windows NT applications such as Windows Explorer and Network Neighborhood as well as by the Windows NT net commands.

In Windows 2000, NetLogon and other networking services now register in DNS, but legacy network command-line applications still use NetBIOS names to access these services.

How It Works

Each service that is NetBIOS-enabled requires a unique NetBIOS name to identify it on the network. This NetBIOS name consists of a name assigned to the computer during installation, which can be up to 15 characters, along with a 1-byte hexadecimal sixteenth character that identifies the type of service or function. The 15-character name can be the computer name, the domain name, or the name of the user who is logged on.

For example, the sixteenth character identifying the Windows NT Messenger service has the 1-byte hexadecimal identifier 03h. On a computer running Windows NT named SERVER12, the Messenger service would be uniquely identified on the network with the NetBIOS name SERVER12[03h]. NetBIOS names are also distinguished by whether they are

The following table shows some of the more common suffixes that constitute the hidden sixteenth character of a NetBIOS name and the networking service with which they are associated.

Common Suffixes for NetBIOS Names

Suffix (Hex) First 15 Characters Networking Service

00

Computer name

Workstation service

00

Domain name

Domain name

03

Computer name

Messenger service

03

User name

Messenger service

06

Computer name

RAS Server service

20

Computer name

File Server service

21

Computer name

RAS Client service

1B

Domain name

Domain master browser

1C

Domain name

Domain controllers

1D

Domain name

Master browser

1E

Domain name

Browser service election

TIP


To view the NetBIOS names registered for your computer, use the nbtstat command.

NetBIOS name resolution

On TCP/IP internetworks, the process by which the NetBIOS name of a computer is resolved to its IP address. NetBIOS name resolution enables NetBIOS hosts to communicate with each other using TCP/IP. Once a host’s name has been resolved to its IP address, the address resolution protocol (ARP) can then be used to resolve the IP address into its corresponding physical layer or MAC address. Once the physical address of a host is known, frames may be placed on the wire and targeted to this address.

How It Works

When you go to the command prompt of a machine running Microsoft Windows and type a Net Use command to map a drive to a network share, you type the NetBIOS name of the target host in the command (for example, net use x: \\server7\pub ). For this command to be fulfilled, the NetBIOS name of the remote host must first be resolved into its IP address so that it can be contacted on the network. This process is called NetBIOS name resolution.

You can use a number of different methods to perform NetBIOS name resolution. The following table shows the order in which these are attempted when the hosts are H-node types. Each method is successively tried until the name is resolved into its IP address or name resolution fails. Some methods will not be available—for example, if there is no NetBIOS Name Server (NBNS) or DNS server on the network.

NetBIOS Name Resolution Methods

Method (in the Order Applied) Comments

Check local NetBIOS name cache

The cache contains recently resolved NetBIOS names.

Contact NBNS

This method works only if NBNS is configured. The name server is usually a Windows Internet Name Service (WINS) server on a Microsoft network. The requestor tries three times to contact the name server, and then tries to contact a secondary WINS server three times (if configured with secondary servers).

Perform local broadcast

The requestor broadcasts a NetBIOS name query request packet. The requestor tries three times before giving an error.

Check local lmhosts file (Unique to Microsoft networks. If all methods fail, an error message states that the computer could not be found on the network.)

The requestor checks if an Lmhosts file exists.

Check local hosts file (Unique to Microsoft networks. If all methods fail, an error message states that the computer could not be found on the network.)

On Windows NT the requestor checks the Hosts file if Enable DNS For Windows Resolution is selected on the WINS Address tab of the TCP/IP property sheet. This option is not available for Windows 2000.

Contact DNS server (Unique to Microsoft networks. If all methods fail, an error message states that the computer could not be found on the network.)

The requestor contacts the DNS server if Enable DNS For Windows Resolution is selected on the WINS Address tab of the TCP/IP property sheet and the DNS tab has a DNS server specified on it. The requestor also tries 5, 10, 20, and 40 seconds later.

NOTE


A separate series of steps is used to resolve host names on a network that uses the Domain Name System (DNS). On IPX/SPX networks, NetBIOS over IPX (NBIPX) resolves NetBIOS names to Internetwork Packet Exchange (IPX) addresses.

See also host name resolution, NetBIOS, NetBIOS name, NetBIOS over TCP/IP node types

NetBIOS Name Server (NBNS)

A server responsible for maintaining a list of mappings between NetBIOS computer names and network addresses for a network that uses NetBIOS as its naming service. A computer registers itself with the NetBIOS name server upon startup by providing the name server with its computer name and network address. When the computer needs to communicate with a remote machine, it queries the name server for the network address of the remote machine. Names can also be resolved by using broadcasts, but this is more wasteful of network bandwidth than use of a dedicated name server.

NOTE


On a Windows NT–based network, an enhanced form of NetBIOS name servers called Windows Internet Name Service (WINS) servers are used. WINS is a NetBIOS over TCP/IP (NetBT) mode of operation defined in Request for Comments (RFC) numbers 1001 and 1002 as p-node. WINS servers can also be used on Windows 2000–based networks, but the primary mode of name resolution for Windows 2000 is the Domain Name System (DNS).

See also Windows Internet Name Service (WINS), WINS server

NetBIOS over TCP/IP (NetBT)

The NetBIOS session-layer protocol and application programming interfaces (APIs) running on top of the TCP/IP network protocol. NetBIOS over TCP/IP (NetBT) supports NetBIOS session and naming functions such as the discovery, resolution, and release of NetBIOS names on a TCP/IP network, which allows the NetBIOS interface and client/server protocol to be extended over wide area networks (WANs). This can be done effectively only if you manage name processes such as NetBIOS name registration centrally using the Windows Internet Name Service (WINS) on Microsoft Windows NT. Broadcast-based name registrations usually don’t work over an internetwork because routers are typically configured not to forward broadcast packets to remote subnets.

The Server, Workstation, NetLogon, Browser, and Messenger services on Windows NT interact with NetBT by using the Transport Driver Interface (TDI) networking component.

NetBIOS over TCP/IP node types

Different configurations or node types of NetBIOS over TCP/IP (NetBT) hosts. The node type determines how the NetBIOS naming functions are performed. For example, the naming functions can be performed by broadcast, by a NetBIOS Name Server (NBNS) such as a Windows Internet Name Service (WINS) server, or by both. The node type also determines the order in which the functions are performed. The following list describes the NetBIOS naming functions (name resolution, name registration, and name release):

The NetBIOS over TCP/IP node types are listed in the following table.

NetBIOS over TCP/IP Node Types

Node Type Method (in the Order Applied) Comments

B-node (broadcast)

Broadcast only

Uses NetBIOS name queries for name registration and name resolution. Typically not forwarded by routers, so limited to local subnet. Can create excessive traffic in large networks.

P-node (peer-to-peer)

NBNS only

Uses NBNS, which is a single point of failure for NetBIOS naming functions.

M-node (mixed)

Broadcast

NBNS

A combination of B-node and P-node. Uses broadcast by default. If unable to resolve, uses NBNS.

H-node (hybrid)

NBNS

Broadcast

A combination of P-node and B-node. Uses NBNS by default. Default node type for Microsoft clients if an NBNS is configured on the network.

Microsoft enhanced B-node

NetBIOS name cache

Broadcast

Lmhosts file

An enhanced broadcast that utilizes the Lmhosts file. Default node type for Microsoft clients if no NBNS is configured on the network.

TIP


You can configure the NetBIOS node type directly on a Microsoft Windows NT client by using the registry, but the preferred way is to configure DHCP scope option number 46 on the DHCP server and configure the clients as DHCP clients.

See also NetBIOS name resolution

NetBIOS scope ID

A character string appended to a NetBIOS name of a host that identifies the host as belonging to a specific group. You can use NetBIOS scope IDs to segment the flat NetBIOS namespace into a series of subspaces. Two hosts can communicate only if they have the same NetBIOS scope ID and belong to the same subspace. The total length of a NetBIOS name plus scope ID cannot exceed 256 characters.

NOTE


The topology of NetBIOS subspaces does not have to match the physical topology of the network or the logical topology of subnets on a TCP/IP internetwork.

TIP


Using NetBIOS scope IDs is no longer recommended, especially if you are also using the Domain Name System (DNS) for naming hosts on your network. You should configure NetBIOS scope IDs only if you want to isolate a particular subset of computers on your network from the rest of the network and allow them to communicate only among themselves. (You configure a NetBIOS scope ID on a computer running Microsoft Windows NT 4 by using the WINS Address tab of the TCP/IP property sheet. In Windows 2000, you must manually modify an entry in the registry.)

If trust relationships are configured between several Windows NT domains on your network, using NetBIOS scope IDs can break the effect of these trust relationships by preventing pass-through authentication between trusted domain controllers that have different scope IDs. Furthermore, in a single-domain environment, if the scope ID of a workstation is different from that of the domain controllers, users will not be able to log on to the network at that workstation.

NetBT

See NetBIOS over TCP/IP (NetBT)

net commands

A group of commands that can be used at the command prompt for managing certain aspects of networking on Microsoft Windows platforms. These commands are summarized in the following tables. For more information about a specific command (such as net accounts), type net accounts /? or net help accounts at the command prompt. For additional information on the net commands for Windows NT and Windows 2000, refer to Windows Help.

Net Commands for Windows NT and Windows 2000

Command Description

Net Accounts

Update the accounts database, modify account and password settings, or display account information.

Net Computer

Add or remove computers from the domain.

Net Config

Display or change the setting for the Server or Workstation service.

Net Continue

Restart a paused Windows service.

Net File

Display a list of open shared files and file locks; this command can be used to close a shared file and remove a file lock.

Net Group

Add, modify, delete, or display global group account information in the domain directory database.

Net Help

Obtain a list of net commands or get help for a specific net command.

Net Helpmsg

Obtain further information about Windows network messages.

Net Localgroup

Add, modify, delete, or display local group account information in the local or domain directory database.

Net Name

Add, delete, or display the names or aliases that the Messenger service recognizes as representing your computer.

Net Pause

Pause a Windows service to allow users to disconnect before stopping it.

Net Print

Display and manage jobs in a print queue.

Net Send

Send a message to a user or computer over the network.

Net Session

Display the list of currently connected sessions on the local computer.

Net Share

Create, delete, or display shared resources.

Net Start

Display a list of running services or start a specific stopped service.

Net Statistics

Display statistics about the Server and Workstation services.

Net Stop

Stop a specified Windows service that is currently running.

Net Time

Synchronize the computer’s clock with that of another computer or domain, or display the time for a computer or domain.

Net Use

Connect or disconnect to shared resources or display information about connections.

Net User

Add, modify, delete, or display user account information in the local or domain directory database.

Net View

Display a list of computers in the domain or display the shared resources available on a specific computer.

Net Commands for Windows 95 and Windows 98

Command Description

Net Config

Display current computer settings.

Net Diag

Run the Microsoft Network Diagnostic program to display diagnostic information about a computer.

Net Help

Obtain a list of net commands or get help for a specific net command or error message.

Net Init

Load protocol and network-adapter drivers without binding them to Protocol Manager.

Net Logoff

Break connections to network resources.

Net Logon

Log on to a domain.

Net Password

Change logon password.

Net Print

Display and manage jobs in a print queue.

Net Start

Start services.

Net Stop

Stop services.

Net Time

Synchronize the computer’s clock with that of another computer or workgroup, or display the time for a computer or workgroup.

Net Use

Connect or disconnect to shared resources or display information about connections.

Net Ver

Display information about workgroup redirector.

Net View

Display a list of computers in the workgroup or display the shared resources available on a specific computer.

Example

Some of the commands produce more than one screen of output at the command prompt. To prevent information from scrolling off the screen, pipe the output through More (for net help accounts | more).

Net-Library

A network interface layer that Microsoft SQL Server uses to communicate with database client software.

How It Works

Net-Libraries are specific to each type of interprocess communication (IPC) mechanism. A Net-Library can be loaded for each IPC mechanism being used—for example, one Net-Library for named pipes communication and another for TCP/IP sockets. Net-Libraries are used at both the server and client levels. This allows clients on different networks to be supported simultaneously using the built-in Microsoft Windows NT and Windows 2000 support for running multiple network protocols simultaneously on one system.

Net-Libraries on SQL Server listen for incoming connection attempts from database clients. SQL Server has a multiprotocol networking library that listens using named pipes, TCP/IP ports, and Sequenced Packet Exchange (SPX) sockets.

NOTE


Be sure to distinguish between the particular IPC mechanism and its underlying network protocol. Some IPC mechanisms (such as named pipes) can function simultaneously over multiple network protocols such as NetBEUI, NWLink IPX/SPX, and TCP/IP.

NetLogon service

A Microsoft Windows NT service that authenticates users who attempt to log on to the domain. For example, if a user attempts to log on interactively to a computer running Windows NT Workstation within the domain, the NetLogon service running on the workstation forwards the logon request to a domain controller within the domain using a process called pass-through authentication. The workstation knows how to contact the domain controller because during startup the workstation finds a domain controller through a process called discovery, after which an implicit trust relationship establishes a secure communication channel between the workstation and the domain controller.

The NetLogon service also ensures that all domain controllers within the domain are synchronized by having the primary domain controller (PDC) periodically notify groups of backup domain controllers (BDCs) that they should query the PDC for any updates to the Security Account Manager (SAM) database. The NetLogon service also enables and maintains trust relationships between domains on a multidomain deployment of Windows NT.

NetLogon Share

The administrative share for the scripts folder on Microsoft Windows NT domain controllers at %SystemRoot%\system32\repl\import\scripts. This share is used by the NetLogon service for the following purposes:

When a client logs on to a Windows NT domain and is authenticated, the final step in the logon process involves connecting to the NetLogon share and downloading or applying any of the items in the preceding list.

netstat

A TCP/IP utility that displays the current TCP/IP connectivity status and statistics. Netstat is available on a computer running Microsoft Windows if the TCP/IP protocol stack has been installed on that machine. You can run netstat from the command prompt to get current TCP/IP statistics and connections for the local machine. You can also view statistics on a per-protocol basis for Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Protocol (IP), or Internet Control Message Protocol (ICMP).

Netstat provides information on

NetWare

A network operating system from Novell that is widely used in local area networks (LANs). NetWare was created by Novell in the early 1980s.

NetWare versions 2 and 3 were essentially used for LAN-based file and print servers running the Internetwork Packet Exchange (IPX) protocol that were administered by menu-driven MS-DOS-based utilities such as syscon, filer, fconsole, pconsole, and monitor. NetWare 4 offers a more scalable solution by providing Novell Directory Services (NDS). The hierarchical NDS allows users to locate and access shared resources anywhere on the network regardless of their physical location. NDS supports the TCP/IP protocol and the Windows-based administration tool nwadmin, which replaced most of the menu-driven MS-DOS–based administration tools for managing an entire NetWare 4–based network from a single location. NetWare 4 also supports single-network logon, in which users log on once to the NDS tree, are authenticated, and can then find and access all resources on the network for which they have appropriate permissions. Other internal system enhancements enable NetWare 4 to provide improved performance for file and print services.

NetWare 5, the latest version, includes support for native Internet Protocol (IP), Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), and a new multiprocessing kernel with virtual memory support.

TIP


Microsoft Windows NT and Windows 2000 offer many services for interoperating with and migrating from NetWare servers and networks, including the following:

NetWare Directory Services

See Novell Directory Services (NDS)

NetWare protocols

The group of protocols developed for and specific to the Novell NetWare network operating system (NOS); popularized in NetWare versions 2 and 3. Some of the networking architecture of NetWare protocols evolved from the Xerox Network Systems (XNS) created in the late 1970s. The more important NetWare protocols that figure prominently in NetWare version 3 include the following:

NOTE


In addition to these original NetWare protocols, NetWare version 4 also supports Internet Protocol (IP) encapsulation of IPX/SPX packets, which means that IPX datagrams can be encapsulated within User Datagram Protocol (UDP) packets for transmission over TCP/IP internetworks. NetWare 5 has native support for TCP/IP.

Net Watcher

A system tool in Microsoft Windows 95 and Windows 98 for monitoring shared resources on other computers running Windows 95 and Windows 98. You must enable remote administration on the computers to be monitored using the Passwords utility in Control Panel. Net Watcher is the Windows 95 and Windows 98 equivalent of the more powerful Windows NT tool Server Manager and Windows 2000 tool Computer Management.

Net Watcher shows all current connections to a computer running Windows 95 or Windows 98, along with the names of the connected users, the files and printers that are in use, and the level of access granted. An administrator can use Net Watcher to disconnect users from shared resources, close files that are in use, create new shares, and stop sharing existing shares.

graphic n-2. net watcher.

Graphic N-2. Net Watcher.

NOTE


Net Watcher cannot show hidden shares.

Network Access Point (NAP)

A point at which sections of the Internet’s high-speed backbone are connected. Internet service providers (ISPs) are connected at Network Access Points (NAPs) so that they can exchange packets.

How It Works

The backbone of the Internet actually consists of sections of high-speed fiber-optic cabling that are owned by different carriers (including AT&T, Sprint, and MCI WorldCom). NAPs are places at which these carriers interconnect their lines so that the Internet can function as a single entity. NAPs contain high-speed switching facilities for transferring traffic from one carrier’s lines to another’s.

The National Science Foundation originally established four different NAPs in Chicago, New York, San Francisco, and Washington, D.C., but with the growth of the Internet and the changing landscape of telecommunication carrier companies, more NAPs have been created. These include “MAE West” in San Jose and “MAE East” in Washington, D.C., both of which are operated by MCI WorldCom.

To lessen the traffic burden on the Internet’s backbone, major ISPs can connect their services directly to a NAP in the form of a “peering arrangement,” whereby traffic that needs to move between two ISPs connected to the same NAP can move directly from one ISP to the other instead of having to traverse the Internet’s backbone.

network access server (NAS)

A general name for a server at an Internet service provider (ISP) that a dial-up client connects to in order to establish a Point-to-Point Protocol (PPP) connection. Network access servers (NAS’s) provide dial-up entry points for PPP clients to connect to the Internet. They can also be used to tunnel through the Internet to establish a virtual private network (VPN) using the Point-to-Point Tunneling Protocol (PPTP). Another name for a NAS is a point of presence (POP) server.

The NAS is typically responsible for authenticating the dial-up client’s credentials and negotiating flow control and error correction. NAS’s can be general-purpose server computers running specialized NAS software such as Internet Connection Services for Microsoft Remote Access Service (RAS), or they can simply be routers with support for a built-in PPP connection, which are often called “access servers.”

graphic n-3. network access server (nas).

Graphic N-3. Network access server (NAS).

network adapter card

See network interface card (NIC)

network address translation (NAT)

A form of packet filtering used in firewall products that protects a network from outside intrusion by hackers. Network address translation (NAT) also eliminates the need for an organization to have a set of globally unique IP addresses, thus helping to conserve the available pool of IPv4 addresses for the Internet.

How It Works

NAT is essentially the translation of IP addresses in one network into those for a different network. NAT is usually implemented on firewalls in which one network (the private network) is hidden behind the firewall while the other network (the public network) represents distrusted users from whom the IP addresses of the private network must be hidden.

NAT replaces the internal network IP address for each Internet Protocol (IP) packet passing through the firewall with a dummy one from a fixed pool of addresses. The actual IP addresses of computers on the private network are thus hidden from users outside the firewall. All requests that pass through the firewall have their addresses translated on the way to the private network, and all responses returned to the unsecure public network have their addresses translated back on the way out of the private network.

Implementing NAT on a router or firewall essentially involves creating and configuring a NAT table containing the private/public IP address mappings. These mappings can be statically created or dynamically generated from a specified pool of IP addresses (either randomly or, more often, on a round-robin basis). A static NAT table essentially consists of a series of NAT rules that specify how IP addresses will be translated.

For example, a typical static NAT rule might be equivalent to the statement, “Translate all IP addresses belonging to the network 176.43.8.z to IP addresses in the form 145.5.133.z with the subnet mask 255.255.255.0 used for both networks.” This rule results in the address 176.43.8.1 being mapped to 145.5.133.1, 176.43.8.2 being mapped to 145.5.133.2, and so on.

A dynamic NAT rule might be used when the number of IP addresses that need to be translated is not equal to the number of NAT IP addresses that you can translate to. In this case, if all the NAT IP addresses are being used, external hosts trying to form new connections are rejected. Each time a connection is formed between the external and internal networks, a different NAT IP address is assigned to the internal host being connected to. This effectively hides the network identity of the hosts on the private network from hosts outside the firewall.

Another NAT technique that is frequently implemented on Linux machines is called masquerading. In this situation, all the IP addresses of the internal private network are hidden to outsiders, who can access only the single IP address of the interface exposed to the public network. An arbitrary number of Transmission Control Protocol (TCP) connections can be multiplexed through the single IP address by assigning each connection a different port number (chosen by default from the range 61,000 through 65,096, which allows up to 4096 simultaneous connections).

In addition to securing your private corporate network, NAT also reduces the need to get a block of unique IP addresses from your Internet service provider (ISP). Only the far side of your router or firewall server needs a unique IP address from your ISP—you can use any IP addresses within your network because your private network is securely hidden from the outside world behind your firewall. This reduces costs and helps extend the viability of the current IPv4 system by reducing the number of unique IP addresses required on the Internet. In fact, the original impetus for the development of NAT technologies was the fact that the available pool of unique IPv4 addresses was steadily running out. NAT was viewed as a temporary solution until IPv6 could be standardized and implemented, but the security advantages of using NAT in firewalls has revitalized IPv4 and made migration to IPv6 less urgent.

NAT is defined in Request for Comments (RFC) 1631.

Network and Dial-up Connections

A utility in Microsoft Windows 2000 that allows a client machine to connect to a remote access server or the Internet over a phone line or some other WAN link. (This utility is named Dial-Up Networking in Windows NT, Windows 95, and Windows 98.) In Windows 2000, you can use Network and Dial-up Connections to create

You can also use Network and Dial-up Connections to configure a stand-alone computer running Windows 2000 (one that is not part of a domain) to accept incoming connections from other computers.

NOTE


If your Windows 2000–based computer is part of a domain, use the Routing and Remote Access console to configure instead of Network and Dial-up Connections to accept incoming connections.

network architecture

An umbrella term describing the topologies, access methods, protocols, and other technologies used for networking. The following are examples of network architectures for local area networks (LANs):

network client

Software that runs on a client computer and allows it to establish connectivity with services running on server computers. In Microsoft Windows 95 and Windows 98, the network client is one of several components that can be installed to provide connectivity with different kinds of networks. Without the appropriate client software, a workstation cannot access files and print resources or other resources on a network server.

Windows 95 and Windows 98 include several different network clients:

NOTE


To add or remove a network client, use the Network utility in Control Panel, select the Configuration tab, and click Add.

Network Client 3.0 for MS-DOS

An add-on for MS-DOS that allows MS-DOS-based workstations to use resources such as shared folders, printers, and applications on a Microsoft network. Using Network Client, an MS-DOS-based workstation can participate in both workgroups and Windows NT domains.

Network Client must be installed on a machine that already has MS-DOS installed on it. Network Client has limited support for TCP/IP networking functionality such as Dynamic Host Configuration Protocol (DHCP), Windows Internet Name Service (WINS), and Domain Name System (DNS).

NOTE


You can create installation disks for Network Client using the Network Client Administrator tool in Windows NT.

TIP


If you can’t remember the syntax for Network Client commands when you use the MS-DOS command prompt, type net to load and open the Network Client pop-up command interface.

Network Client cannot function as a master browser, so if you want to browse network resources using Network Client, a master browser must already be installed on the network.

Network Client Administrator

A Microsoft Windows NT administrative tool for installing client software on client machines. You can use Network Client Administrator to

network driver interface specification (NDIS)

A standard or specification that simplifies the process of writing drivers for network interface cards (NICs) and enables them to interact transparently with various transport protocols. The network driver interface specification (NDIS) is also a library of routines (or “wrapper”) in Microsoft Windows NT that is implemented through the file ndis.sys, which provides a uniform programming interface between NIC drivers and network protocols. NDIS simplifies the development of drivers for NICs.

NDIS was developed jointly by Microsoft and 3Com in 1989 and has gone through a series of revisions, as shown in the following table. The most recent versions allow one NIC to be bound to many protocols (which is ideal for heterogeneous networks) or allow one protocol to run on a system with multiple NICs (which helps increase network bandwidth for heavily used servers).

NDIS Versions

Version Platform 16-bit or 32-bit Features

2

Windows for Workgroups and OS/2

16

Real mode; each NIC must have its own driver.

3

Windows NT 3.5 x

32

Unlimited number of NICs can be bound to an unlimited number of protocols.

3.1

Windows 95

32

A superset of NDIS 3 with plug and play functionality and support for minidrivers. Windows 95 supports up to four NICs in a computer.

4

Windows NT 4

32

Unlimited number of NICs can be bound to an unlimited number of protocols. Also allows capturing of all frames on local network segment without the need to switch the NIC to promiscuous mode.

5

Windows 98 and Windows 2000

32

Adds support for connection-oriented networks such as Integrated Services Digital Network (ISDN) or Asynchronous Transfer Mode (ATM), including support for multiple virtual circuits on one network adapter.

See also I/O Manager

Network File System (NFS)

A client/server distributed file system developed by Sun Microsystems that has become the standard file system for various implementations of the UNIX platform. Network File System (NFS) lets users transparently store and access information on both local and remote computers on a TCP/IP internetwork.

How It Works

NFS uses remote procedure calls (RPCs) running over User Datagram Protocol (UDP) on server port 2049 for stateless communication between clients and file servers on the network. NFS clients (client machines running NFS client software) import remote file systems from NFS servers, while the NFS servers export local file systems to clients.

Machines running the NFS client can connect to NFS servers and read, modify, copy, move, or delete files on the server using RPC requests such as READ, WRITE, CREATE, and MKDIR. To the user accessing the remote file system from the client, the files appear to be stored locally on his or her system.

Before a user can access files within the directory structure on the local UNIX file system of the NFS server, the administrator must mount the portions of the local UNIX file system that will be made accessible to clients and assign appropriate user privileges.

network ID

The portion of an IP address that identifies the TCP/IP network on which a host resides. The network ID portion of an IP address uniquely identifies the host’s network on an internetwork, while the host ID portion of the IP address identifies the host within its network. Together, the host ID and network ID, which make up the entire IP address of a host, uniquely identify the host on a TCP/IP internetwork.

How It Works

The network ID is found by logically ANDing the binary form of the IP address with the binary form of the subnet mask for the network. For example, if a host has an IP address of 172.16.8.55 on a network with a subnet mask of 255.255.0.0 (the default subnet mask), the network ID of the host is 172.16.0.0, or simply 172.16.

TIP


When you assign network IDs to local area networks (LANs) connected by routers, each LAN and each WAN link must have a unique network ID.

See also host ID

Network Information System (NIS)

A client/server directory services application developed by Sun Microsystems for UNIX. Network Information System (NIS) acts as a kind of “yellow pages” for locating resources on a TCP/IP internetwork, enabling applications or users to locate and access files and applications anywhere in the network using only a single username and password.

How It Works

NIS uses remote procedure calls (RPCs) for communication between clients and servers. NIS client programs access NIS servers to locate resources and authenticate resource access.

A newer version called NIS+ includes additional security features. NIS is often used with the Network File System (NFS).

network interface card (NIC)

An adapter card that plugs into the system bus of a computer and allows the computer to send and receive signals on a network. A network interface card (NIC) is also known as a network adapter card or simply a network card.

How It Works

NICs can be legacy components that require manual configuration of interrupt request (IRQ) and base I/O port settings, or they can be plug and play components. NICs are available for any system bus type: Industry Standard Architecture (ISA), Extended Industry Standard Architecture (EISA), Micro Channel Architecture, and Peripheral Component Interconnect (PCI). PCI cards are 32-bit and give the best performance. They are available in various speeds, such as 10 Mbps for Ethernet and 10/100 Mbps for Fast Ethernet. Other cards are available for networking technologies such as Token Ring and Fiber Distributed Data Interface (FDDI).

A computer can communicate with the NIC using several methods, including memory-mapped I/O, direct memory access (DMA), or shared memory. A parallel stream of data is sent to the card and buffered before being packaged into discrete frames for serial transmission over the network. Framing adds headers and trailers to the data, which contains addressing, clocking, and error-checking information. The frames are then converted to electrical voltage pulses that drive an electrical signal over the wire. The receiving NIC processes the signal in the reverse order into a data stream for the receiving computer. Many of these functions are built into the network firmware, while others are governed by the NIC driver software installed on the computer.

NICs can have one or more connectors for cabling to be attached, such as

network layer

Layer 3 of the Open Systems Interconnection (OSI) reference model for networking. The network layer is responsible for functions such as the following:

The network layer also supplies connectionless and connection-oriented services to the transport layer above it. The network layer functions closely with the physical layer (layer 1) and data-link layer (layer 2) in most real-world network protocol implementations.

On TCP/IP-based networks, IP addresses and network numbers are used at the network layer, and IP routers perform their routing functions at this layer. An example of an OSI model network layer protocol is the X.25 packet-switching network layer protocol, which is built on the X.21 physical layer protocol.

See also Open Systems Interconnection (OSI) reference model

Network Monitor

A Microsoft Windows 2000 and Windows NT administrative tool that functions as a software-based network packet analyzer for troubleshooting network problems. You can use Network Monitor to

NOTE


The version of Network Monitor included with Windows NT is a simplified version that lacks some of the features in the full version included with Microsoft Systems Management Server (SMS). In particular, the simplified version can perform only local capturing of data to and from the computer running Network Monitor.

Network Monitor Agent

A Microsoft Windows NT service that allows a computer to capture all traffic on the local network segment, which it can then collect centrally and display on a computer running Network Monitor. Network Monitor Agent also provides the Network Segment object for Performance Monitor. You can install Network Monitor Agent in Windows NT, and you can install a similar service in Windows 95 and Windows 98, by using the Network utility in Control Panel. (See the Admin folder on the Windows 95 or Windows 98 CD.)

NOTE


To install Network Monitor Agent in Windows NT, use the Network utility in Control Panel. Then use the Network Monitor Agent utility in Control Panel to configure, capture, and display packets to prevent unauthorized monitoring of your server. Installing Network Monitor Agent also enables the Network Segment object in Performance Monitor.

Network Neighborhood

A desktop icon in Microsoft Windows NT, Windows 95, and Windows 98 that allows users to browse shared network resources on their computers. Using Network Neighborhood, you can browse resources on the network in the same way that you use My Computer to browse the resources on your local machine. These two tools provide complementary views of system and network resources to those provided by Windows Explorer.

When you open Network Neighborhood to view the connected network, you see all the computers in your present domain or workgroup, plus an entity called Entire Network. You can open Entire Network to browse resources on all the connected networks that your computer is aware of.

TIP


If you know your network domain settings are correct and you try to browse Network Neighborhood but only the Entire Network icon is visible, and if when you double-click on the Entire Network icon you get an error message saying “Unable to browse the network,” your network cable might have come loose from its network interface card (NIC).

See also My Computer, My Network Places

Network News Transfer Protocol (NNTP)

An Internet standard protocol that governs the interaction between Network News Transfer Protocol (NNTP) servers (news servers) and NNTP clients (news readers). NNTP is the underlying protocol on which the Usenet Internet news system is built.

How It Works

NNTP is both a client/server protocol and a server/server protocol. It offers a set of simple text commands that

NNTP connections between clients and servers and between servers and servers use Transmission Control Protocol (TCP) for reliable, guaranteed packet delivery. Clients connecting to servers might require authentication before their NNTP commands are accepted.

NNTP client commands include the following:

NNTP is defined in Request for Comments (RFC) 977.

network numbers

Numbers that you must configure to ensure proper network communication when you configure the NWLink IPX/SPX-Compatible Transport protocol for Microsoft Windows NT and Windows 2000. You must configure two different network numbers to ensure proper network communication:

NOTE


For the TCP/IP protocol for Windows NT and Windows 2000, the network number is usually referred to as the network ID.

TIP


To view the IPX network number of a computer running Windows NT or Windows 2000, type ipxroute config at the command prompt.

network of computers

A group of computers connected in some fashion in order to share resources. Networks with enhanced storage and server-based processing power provide users with greater functionality and security than independent or stand-alone machines.

Networks can be classified based on

NOTE


In TCP/IP networking, a network is a group of hosts with the same network ID. Multiple networks can be combined using routers to form an internetwork. Each network in an internetwork can be referred to as a subnetwork.

network operating system (NOS)

Also called server operating system, a computer operating system that is network-aware. Network operating systems (NOS’s) typically provide support for features such as the following:

You can use a NOS to create local area networks (LANs) that function as either peer-to-peer networks or server-based networks, depending on your needs and budget. Examples of NOS’s include Microsoft Windows NT, Novell NetWare, and Banyan VINES. Cisco’s Internetwork Operating System (IOS) is an example of a NOS that runs not on computers but on internetworking devices such as routers.

network protocol

A protocol that operates at the network layer (layer 3) of the Open Systems Interconnection (OSI) reference model for networking. Common network protocols include the following:

Microsoft 32-bit Windows operating systems are implemented in a layered fashion that allows multiple network protocols to be bound to multiple network interface cards (NICs) and allows multiple network clients and services to access these protocols. Windows computers can thus establish connectivity and interoperability with non-Microsoft operating system platforms such as UNIX and Novell NetWare.

network resources

See resource on a network

networks file

A text file that provides a local method of resolving network names into their network IDs on a TCP/IP network. The entries in the networks file are friendly names for TCP/IP networks; they can be used in TCP/IP commands such as the route command and for TCP/IP network management.

How It Works

The networks file is at the following location on computers running Microsoft Windows:

Each line in the networks file contains a friendly network name for the network, followed by the IP address of the network and an optional comment prefixed with a pound sign (#). The following example is from the sample networks file included with Windows 95 and Windows 98:

 loopback     127 campus       284.122.107 london       284.122.108 

See also hosts file, lmhosts file, protocol file, services file

Network system group

A special identity or system group that exists on all servers and workstations running Microsoft Windows NT and Windows 2000. The Network group includes any user who has successfully connected to a shared resource on the computer from over the network. The group enables network users to access resources on the computer, in contrast to the Interactive group, which enables locally logged-on users to access resources on the machine.

Administrators cannot modify system groups. This means that they cannot directly modify membership in the Network group or the rights of the group.

See also built-in group

Network Termination Unit (NTU)

A device for connecting digital Integrated Services Digital Network (ISDN) customer premises equipment to ISDN lines. The Network Termination Unit (NTU) allows customer premises equipment to be connected to the switching equipment at the telco’s central office (CO).

How It Works

Digital ISDN customer premises equipment such as routers and ISDN phones usually have an ISDN S/T interface, while the ISDN termination at the customer end of the local loop usually has a U interface using an RJ-45 connector. The NTU converts the U termination of the ISDN line to one or more standard coding S/T interfaces that are suitable for connecting digital ISDN-ready phones, routers, and other devices to an ISDN line. NTUs work differently than ISDN terminal adapters, which allow you to connect analog telephones, faxes, and similar equipment to your ISDN line. NTUs typically support either point-to-point or multipoint connections over distances of up to 5.4 kilometers on 26 AWG copper twisted-pair cabling.

NOTE


Some newer ISDN-enabled devices have a built-in U interface, making an NTU unnecessary. The following table shows the differences between the Basic Rate ISDN U and S/T interfaces.

Basic Rate ISDN U Interfaces vs. Basic Rate ISDN S/T Interfaces

Property U Interface S/T Interface

Number of wires

2

4

Connector

RJ-45

RJ-45

Zero-to-peak voltage

2.5 V

0.75 V

Line coding

2B1Q (or 4B3T in Europe)

ASI (Alternate Space Inversion)

See also Integrated Services Digital Network (ISDN)

network utilization

The percentage of available bandwidth being used in a network. For Ethernet networks, a network utilization of 40 to 60 percent is normally the maximum; higher utilization results in more collisions and retransmissions. Another word that describes network utilization is “throughput,” which is typically measured in Mbps or MB/sec.

newsfeed

Information sent from one Usenet host to another to replicate newsgroup listings and content. Newsfeeds are an essential part of the Usenet architecture; they allow news servers all over the Internet to exchange lists of newsgroups and messages. Usenet newsfeeds come in two types:

The host that provides the newsfeed is called the inbound host; the host that receives the newsfeed is called the outbound host.

NOTE


Microsoft Exchange Server supports downloading Usenet newsfeeds through the Internet News Service.

newsgroup

A collection of posted messages on a Network News Transfer Protocol (NNTP) server. Newsgroups contain postings on a particular topic, although they are often a prime target for spammers who post unsolicited advertisements. Newsgroups are defined hierarchically using a dotted notation. An example of a newsgroup is alt.books.computing, which is an “alternative” group that discusses books about computing. The dotted notation of the newsgroup name emphasizes the hierarchical structure of the Usenet system of newsgroups. For example,

Newsgroups can be either moderated or unmoderated. In moderated newsgroups, all messages posted to the newsgroup are first sent to the newsgroup moderator, who accepts or rejects messages depending on their relevance to the group’s focus. Unmoderated groups are generally a free-for-all, although politeness dictates that users post only messages related to the newsgroup’s focus.

TIP


When you first join a newsgroup, it’s a good idea to “lurk” in the background for a while and read the postings to understand the focus and tone of the group. Posting off the topic or at too low a level in an advanced group can lead a “newbie” to get flamed.

See also Usenet

NEXT

See near-end crosstalk (NEXT)

Next Generation I/O (NGIO)

A specification from the Next Generation I/O (NGIO) Forum that is designed to replace the Peripheral Component Interconnect (PCI) system bus. With today’s Pentium III processors and high-speed hard disks, the PCI bus is rapidly becoming the bottleneck that limits the performance of high-speed data center servers. The PCI bus is limited to about 500 Mbps of shared throughput. It lacks an error-detection mechanism and has relatively high latency. NGIO is intended to overcome these limitations. It uses a channel-based architecture that supports full-duplex transmission speeds of up to 2.5 Gbps.

NOTE


The NGIO Forum recently combined its efforts with a group called Future I/O, which was promoting a different standard. The combined standard will be called System I/O; its development group is headed by Intel and IBM and includes Microsoft, Sun Microsystems, Hewlett-Packard, and Dell. System I/O is expected to reach the server market in the year 2001. It will use a channel-based I/O architecture instead of a bus architecture and will use from 1 to 12 wires, each having a throughput of 2.5 Gbps. The channel-based architecture will allow different channels to carry different information to different components simultaneously, which will be a great improvement over parallel-transmission bus technologies. System I/O will also fully support hot-swapping of components.

On the Web

NGIO Forum : http://www.ngioforum.org

NFS

See Network File System (NFS)

NGIO

See Next Generation I/O (NGIO)

NIC

See network interface card (NIC)

NIS

See Network Information System (NIS)

NIST

See National Institute of Standards and Technology (NIST)

NNTP

See Network News Transfer Protocol (NNTP)

NNTP service

A Microsoft Windows 2000 or Windows NT service that is installed on Windows 2000 Server by default and installed when Microsoft Internet Information Server (IIS) version 4 is set up on Windows NT. The NNTP service, which you manage using Microsoft Management Console (MMC), hosts Usenet-style newsgroups and allows news readers such as Microsoft Outlook Express and Microsoft Internet Mail and News to access those newsgroups and post messages to them.

Features of the NNTP service on IIS include the following:

TIP


The NNTP service on IIS 4 can use virtual directories to make locating newsgroup content easier.

node

A general term for a device on a network that has a specific physical or logical address or can recognize addresses. Nodes can be computers, repeaters, bridges, or other devices on a network that can transmit, receive, or process signals. Another name for a node, especially on Ethernet networks, is a station.

Other common meanings of the term “node” include

noise

Undesirable random electrical transmission on network cabling that is generated by networking components such as network interface cards (NICs) or induced in cabling by proximity to electrical equipment that generates electromagnetic interference (EMI). Noise is generated by all electrical and electronic devices, including motors, fluorescent lamps, power lines, and office equipment, and it can interfere with the transmission of signals on a network. The better the signal-to-noise ratio of an electrical transmission system, the greater the throughput of information on the system.

TIP


You can generally reduce noise by using higher-quality components, lowering the temperature of components, or using shielded cabling. Be sure to locate sensitive networking components and cabling away from heavy machinery, generators, motors, and other equipment that can generate a lot of EMI. Also be sure to terminate cables properly at patch panels and wall plates to minimize noise due to crosstalk.

See also signal

normal backup

A backup type in which all the selected files and folders are backed up. Also known as full backup, this is the most secure way of backing up files and folders to tape. In a normal backup, the archive attribute is marked for each file and folder that is backed up. If the file is later modified, the archive attribute is cleared, indicating that the file needs to be backed up again. Normal backups are the safest form of backup but take the longest and use the most tape. They are also the easiest form of backup to perform a restore from, because you generally need only one tape to perform the restore (unless the amount of information to be backed up exceeds the capacity of the tape).

TIP


A good backup plan consists of at least one normal backup each week, with either incremental or differential backups during the rest of the week.

See also backup, backup type

NOS

See network operating system (NOS)

Novell Directory Services (NDS)

A distributed network directory service for managing network resources such as users, servers, and peripherals that is loosely modeled after the X.500 specification. Novell Directory Services (NDS) was originally called NetWare Directory Services.

How It Works

The foundation of NDS is the directory tree, which provides a hierarchical view of all network resources. Resources in the network can be grouped logically according to their location, function, or the structure of the company. Objects in the tree can be either containers or leaf objects, with the root container being the name of the company or organization. Containers can be considered branches and can hold leaf objects or other containers. When a user is assigned access rights to a container, these rights flow down into any subcontainers within the container. Trees, subtrees, and containers can also be renamed and merged.

You can implement NDS directories as a distributed database that is partitioned among multiple NDS servers on the network to provide fault tolerance and load balancing. As a result, no single server contains or is responsible for the entire directory. The NDS servers replicate with each other to ensure that each server contains an up-to-date version of the directory for the portion of the directory that the server is responsible for. To locate an object such as a user, a group, a shared directory, or a printer on the network, an NDS client can access the directory on any NDS server.

NOTE


NDS was originally tied to the NetWare 4 operating system, but it is now available for other platforms, including UNIX and Microsoft Windows NT.

nslookup command

A TCP/IP utility on Microsoft Windows NT and Windows 2000 for diagnosing problems with name servers at the command prompt. Nslookup is installed on a computer running Windows NT or Windows 2000 when you install the TCP/IP protocol on the machine. You can use nslookup to manually display resource records in the zone files of DNS servers. The utility can operate in either an interactive or a noninteractive mode.

You enter interactive mode by typing nslookup at the command prompt. Once in the interactive running state, you can type ls -d microsoft.com to list all the resource records for the microsoft.com domain that are stored in the DNS database of the name server being queried.

NS record

See name server (NS) record

NTFS file system

An advanced, high-performance file system designed for use with the Microsoft Windows NT and Windows 2000 operating systems. NTFS is superior to the file allocation table (FAT) file system in many respects, providing better performance, reliability, and compatibility. NTFS includes security features for data access control and ownership privileges that make it suitable for file servers, Web servers, and application servers in the corporate networking environment. The following table shows a comparison between the features of NTFS and FAT.

NTFS Compared with FAT

Feature NTFS FAT

Local security

x

File-level access permissions

x

Automatic recoverability using lazy writes and transaction logging

x

Lazy writes only

File-level compression

x

POSIX-compliant

x

Supports Services for Macintosh

x

Dual boot with Windows 95 and Windows 98

x

Maximum volume size

232 = 4 GB

264 = 32 EB (theoretical)

241 = 2 TB (practical)

Optimal volume size

Less efficient for volumes over ~500 MB

Less efficient for volumes under ~50 MB

How It Works

Like FAT, NTFS uses the cluster as the fundamental unit of disk space allocation. The default size of the clusters for an NTFS volume depends on the size of the volume, as shown in the table. When you create a new NTFS volume by formatting a disk partition with NTFS, the master file table (MFT), which contains information concerning all the files and folders stored on the volume, is created. The MFT is located on the disk immediately after the partition boot sector, which contains the BIOS parameter block and the code that enables the operating system to find and load the startup files. After the MFT comes NTFS system files, which help implement NTFS by storing information such as the contents of the volume, volume name and version, table of attribute names and numbers, a list of transaction steps used for NTFS recoverability, the root folder, and so on. After the NTFS system files is the file area where user data can be stored. The total overhead of the MFT and NTFS system files is about 1 MB.

graphic n-5. structure of an ntfs volume.

Graphic N-5. Structure of an NTFS volume.

Default Cluster Sizes for NTFS

Volume Size Sectors/Cluster Cluster Size

512 MB or less

1

512 bytes

513 KB–1024 MB

2

1 KB

1025 MB–2048 MB

4

2 KB

2049 MB–4096 MB

8

4 KB

4097 MB–8192 MB

16

8 KB

8193 MB–16384 MB

32

16 KB

16385 MB–32768 MB

64

32 KB

32769 MB or more

128

64 KB

NOTE


NTFS on Windows 2000 includes additional features not supported by NTFS on Windows NT. These features are used to provide greater manageability and enhanced security, and to support the new Active Directory of Windows 2000. They include the following:

Note that Windows NT 4.0 systems must be running Service Pack 4 or later to read basic volumes formatted using the Windows 2000 version of NTFS. Also, because of the different disk structures, Windows NT 4 disk utilities such as autochk and chkdsk will not work on Windows 2000 NTFS volumes. Because of these incompatibilities, Microsoft does not recommend dual booting between Windows NT 4 and Windows 2000.

TIP


Here are some recommendations for installing Windows NT Server on a system:

For installing Windows 2000 Server on a system, Microsoft recommends using NTFS for the C partition. You should have a minimum of 1.2 GB of free space on this partition, but at least 2 GB free is recommended.

NTFS permissions (Windows 2000)

A set of permissions used in Microsoft Windows 2000 to secure folders and files located on an NTFS file system partition or volume. NTFS permissions provide security for both local and network access to the file system. They are different from shared folder permissions, which can be applied only to folders and which secure the file system for network access only, not for local access.

How It Works

NTFS permissions in Windows 2000 differ depending on whether they are applied to files or to folders. The five standard file permissions and six standard folder permissions are listed in the following tables. These standard file and folder permissions are actually composed of various groupings of the 18 different special permissions—for more information, see the entry on NTFS special permissions (Windows 2000). These groupings simplify the job of securing files and folders on NTFS file system partitions and volumes.

Standard NTFS File Permissions in Windows 2000

File Permission User Access Granted

read

Open the file and view its permissions, attributes, and ownership

write

Modify the file, modify its attributes, and view its permissions, attributes, and ownership

read & execute

Delete the file and do everything read permission allows

modify

Delete the file and do everything read & execute and write permissions allow

full control

Take ownership, modify permissions, and do everything modify permission allows

Standard NTFS Folder Permissions in Windows 2000

Folder Permission User Access Granted

read

View contents of folder and view its permissions, attributes, and ownership

write

Create new files and folders in the folder, modify its attributes, and view its permissions, attributes, and ownership

list folder contents

View contents of folder

read & execute

View subfolders within the folder and do everything read and list folder contents permissions allow

modify

Delete the folder and do everything read & execute and write permissions allow

full control

Take ownership, modify permissions, and do everything modify permission allows

To use these standard permissions to secure a file or folder you must be the object's owner, have full control of the object, or be a member of the Administrators system group. You must explicitly assign a permission to a file or folder for the permission to be granted. If no permission is specified for a given user or group, the user or group has no access to the file or folder. When you explicitly assign a permission you can choose to either allow or deny the permission.

When you create a file or folder on an NTFS file system volume, it inherits the permissions of its parent folder or volume. When you assign a permission to a parent folder or volume, you have the option of propagating that permission to all of its child folders and files.

The following rules apply to assigning permissions for files and folders on NTFS file system volumes:

NOTE


The differences between NTFS standard permissions for Windows 2000 and for Windows NT include the following:

TIP


When you format a partition or volume using NTFS, the Everyone system group is automatically assigned full control permission for the root of the volume. Any new files or folders you create on the volume inherit this permission. Be aware that leaving full control for everyone might create a security risk; you should replace it with more suitable permissions such as full control for the Authenticated Users special identity.

See also NTFS permissions (Windows NT), NTFS special permissions (Windows 2000), NTFS special permissions (Windows NT)

NTFS permissions (Windows NT)

A set of permissions used in Microsoft Windows NT to secure folders and files on an NTFS file system partition. NTFS permissions provide security for both local and network access to the file system. They are different from shared folder permissions, which can be applied only to folders and which secure the file system for network access only, not for local access.

How It Works

NTFS permissions in Windows NT differ depending on whether they are applied to files or to folders. The four standard file permissions and seven standard folder permissions are listed in the following tables. These standard file and folder permissions are actually composed of various groupings of six NTFS special permissions:

For more information on these special permissions, see the entry on NTFS special permissions (Windows NT).

Standard NTFS File Permissions in Windows NT

File Permission Special Permissions

full control

RWXDPO

change

RWXD

read

RX

no access

None

Standard NTFS Folder Permissions in Windows NT

Folder Permission Special Permissions for Folders Special Permissions for Files in a Folder

full control

RWXDPO

RWXDPO

change

RWXD

RWXD

add & read

RWX

RX

add

WX

Unspecified

read

RX

RX

list

RX

Unspecified

no access

None

None

To use these standard permissions to secure a file or folder you must be the object’s owner, have full control of the object, or be a member of the Administrators system group. You must explicitly assign a permission to a file or folder for the permission to be granted. If no permission is specified for a given user or group, the user or group has no access to the file or folder.

When you create a file or folder on an NTFS file system partition, it inherits the permissions of its parent folder or partition. When you assign a permission to a parent folder or partition, you have the option of propagating that permission to all of its child folders and files.

The following rules apply to assigning permissions for files and folders on NTFS file system volumes:

NOTE


For a description of the differences between NTFS standard permissions for Windows 2000 and for Windows NT, see the entry on NTFS permissions (Windows 2000).

TIP


In most cases NTFS standard permissions are sufficient for controlling access to a file or folder. If standard permissions are not sufficiently granular for your purposes, you can use NTFS special permissions.

See also NTFS permissions (Windows 2000), NTFS special permissions (Windows 2000), NTFS special permissions (Windows NT)

NTFS special permissions (Windows 2000)

Individual permissions granted or denied when NTFS file system standard permissions are not sufficiently granular for specific security purposes. The special permissions available depend on whether you are securing files or folders. In both cases, 14 special permissions are available; 10 of these are common to the two scenarios. The following tables list the various NTFS special permissions available in Microsoft Windows 2000.

NTFS Special Permissions for Both Files and Folders in Windows 2000

Special Permission User Access Granted

read attributes

View the attributes (including read-only, hidden, system, and archive) of the file or folder

read extended attributes

View custom attributes that can be defined by certain applications for the file or folder

write attributes

Modify the attributes of the file or folder

write extended attributes

Modify custom attributes that can be defined by certain applications for the file or folder

delete subfolders and files

Delete subfolders or files

delete

Delete the file or folder; however, even if this permission is denied on a file, you can delete it if its parent folder has been granted delete subfolders and files permission

read permissions

View the permissions on the file or folder

change permissions

Modify the permissions on the file or folder

take ownership

Take ownership of the file or folder

synchronize

Lets threads in multithreaded programs wait on the file or folder handle and synchronize with another thread that signals it

NTFS Special Permissions Only for Files in Windows 2000

Special Permission User Access Granted

execute file

Execute the file

read data

Read the file

write data

Modify the file

append data

Append to the file (but not modify existing data)

NTFS Special Permissions for Folders in Windows 2000

Special Permission User Access Granted

traverse folder

Drill down to other files and folders in the folder even if you have no permissions on intermediate subfolders

list folder

View the names of subfolders and files in the folder

create files

Create files in the folder

create folders

Create subfolders within the folder

How It Works

You can grant or deny special permissions by using the Advanced button on the Security tab of a file’s or folder’s property sheet. You can select different combinations of special permissions to create custom sets of permissions for special purposes. In most cases, however, it is simplest to use NTFS standard permissions for securing files and folders. If you use special permissions, Windows 2000 gives you a lot of flexibility in how you can apply them, especially if you are applying them to a folder. For example, you can apply a custom set of special permissions to

To use special permissions you must be the object’s owner, have full control of the object, or be a member of the Administrators group.

NOTE


There are significant differences between NTFS special permissions for Windows 2000 and for Windows NT. The most obvious difference is that in Windows 2000 you can assign any of 14 special permissions, but in Windows NT you have 6 special permissions to choose from: read (R), write (W), execute (X), delete (D), change permission (P), and take ownership (O). The reason for this difference is that in Windows NT much of the machinery of NTFS is hidden from the user interface, while in Windows 2000 this machinery is exposed in the user interface.

See also NTFS permissions (Windows 2000), NTFS permissions (Windows NT), NTFS special permissions (Windows NT)

NTFS special permissions (Windows NT)

Individual permissions granted or denied when NTFS file system standard permissions are not sufficiently granular for specific security purposes. The special permissions available are the same whether you are securing files or folders, with the exception that when you secure a directory you have the additional option of leaving access unspecified instead of assigning a specific set of special permissions. In both cases, six special permissions are available; these are listed in the following table.

NTFS Special Permissions in Windows NT

Special Permission Abbreviation User Access When Applied to Files User Access When Applied to Folders

read

R

View file owner and permissions

Read the file

View contents of the folder

View folder attributes

View folder owner and permissions

write

W

View file owner and permissions

Modify file attributes

Edit the file

Add files to the folder

Add subfolders

Modify folder attributes

View folder owner and permissions

execute

X

View file owner and permissions

Modify file attributes

Run the executable file

View folder attributes

Browse folder hierarchy

View folder owner and permissions

delete

D

Delete the file

Delete the folder

change permission

P

Change file permissions

Change folder permissions

take ownership

O

Take ownership of the file

Take ownership of the folder

How It Works

By selecting different combinations of special permissions, you can create custom sets of permissions for special purposes. In most cases, however, NTFS standard permissions are sufficient for securing files and folders. To use special permissions you must be the object’s owner, have full control of the object, or be a member of the Administrators system group. For information on which sets of special permissions comprise the various standard permissions, see the entry on NTFS permissions (Windows NT).

NOTE


For a description of the differences between NTFS special permissions for Microsoft Windows NT and for Microsoft Windows 2000, see the entry on NTFS special permissions (Windows 2000).

See also NTFS permissions (Windows 2000), NTFS permissions (Windows NT), NTFS special permissions (Windows 2000)

NTLM protocol

See Windows NT Challenge/Response Authentication

NTU

See Network Termination Unit (NTU)

NTVDM

See NT Virtual DOS Machine (NTVDM)

NT Virtual DOS Machine (NTVDM)

A single-threaded Win32 application that simulates an MS-DOS environment on a Microsoft Windows NT system to enable the system to properly run MS-DOS and Windows 3.x applications. Each MS-DOS-based application running on Windows NT requires its own NT Virtual DOS Machine (NTVDM). As a result, if an MS-DOS-based application fails while running on Windows NT, it does not affect other MS-DOS-based applications.

How It Works

You can customize the NTVDM for an MS-DOS-based application by right-clicking on the application’s executable file and choosing Properties. The settings you can configure are similar to those available in the Windows 3.x tool PIF Editor.

null modem cable

A serial cable with cross-pinning that is used for file transfers and for other specialized communication between computers.

How It Works

Null modem cables, also known as file transfer cables, are used to directly connect two computers for transferring files between them—for example, by using the Direct Cable Connection accessory of Microsoft Windows 95 and Windows 98.

The most common form of null modem cable is based on the RS-232 serial transmission interface specifications. Pins 2 and 3 are crossed in a null modem cable to allow you to directly link two RS-232 serial ports on different computers. Other pins can also be crossed depending on the intended purpose of the cable. The most common forms of termination for these cables are DB9 and DB25 connectors.

Serial RS-232 null modem cables support distances of up to about 15 meters and can be used for any communication for which a direct DTE-to-DTE connection or DCE-to-DCE connection is required. If longer distances are needed in serial communication, you can use a line driver to amplify the signal up to several kilometers. A cable connecting two pieces of data terminal equipment (DTE) is specifically called a null modem cable, while a cable connecting two pieces of data communications equipment (DCE) is usually called a tail-circuit cable and has a different cross-pinning. You can obtain null modem cables for other serial interfaces such as V.35 and those with special types of pinning.

NOTE


Parallel data-transfer cables achieve faster data transfer rates for file transfer than serial null modem cables.

TIP


Use a shielded null modem cable to extend distances up to 30 meters without using line drivers.

NWLink

See NWLink IPX/SPX-Compatible Transport

NWLink IPX/SPX-Compatible Transport

Commonly referred to as “NWLink,” a Windows NT networking protocol that is Microsoft’s version of IPX/SPX, the protocol used in Novell NetWare. NWLink is a 32-bit networking protocol for Windows NT. It is primarily used when

NWLink includes the following features:

TIP


If a Windows NT server or client with NWLink installed is unable to communicate with NetWare clients or servers, check the properties of NWLink to make sure you are using the same frame type as the machines running NetWare. You must also configure network numbers when using NWLink.



Microsoft Encyclopedia of Networking
Microsoft Encyclopedia of Networking
ISBN: 0735613788
EAN: 2147483647
Year: 2000
Pages: 37
Authors: Mitch Tulloch, Ingrid Tulloch
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net