O

[Previous] [Next]

object identifier

A globally unique identifier for an object’s class in Active Directory. An object identifier for an attribute remains unchanged even when the distinguished name of the object is modified because of system configuration changes. Object identifiers ensure that when Active Directory is integrated with other directory systems such as Novell Directory Services (NDS), X.500, or Simple Network Management Protocol (SNMP), no conflicts occur between them. Each class of object in Active Directory has a unique object identifier that is externally assigned by an issuing authority. In the United States, the issuing authority is the American National Standards Institute (ANSI). The International Organization for Standardization (ISO) maintains a list of the world’s issuing authorities. An object’s attributes also require unique object identifiers.

TIP


If you want to create new classes of objects or new attributes in Active Directory using Active Directory Schema Manager, you must obtain an object identifier for your organization. An example of an object identifier for a U.S. company is 1.2.840.105670, where 1.2.840 is assigned to U.S. companies and 105670 is the number assigned to the specific company. Once your company has an object identifier, you can extend it by appending dotted decimal portions. So if 1.2.840.105670 represents Northwind Traders, 1.2.840.105670.27 might represent the Sales division, 1.2.840.105670.33 might represent the Support division, and so on. Further levels of subdivision are also possible.

object in Active Directory

The basic element of Active Directory in Microsoft Windows 2000 that represents something on the network, such as a user, a group, a computer, an application, a printer, or a shared folder.

How It Works

Objects have attributes that define and describe them. For example, the attributes of a user object might include the user’s name, e-mail address, and phone number. All objects of the same type or class have the same set of attributes, but they are distinguished from each other by having different values for at least one of these attributes. Some attributes are required to have values (such as the First Name attribute of a user object), while other attributes can be optional (such as Telephone Number).

You can group objects by placing them into container objects (containers) such as the ones following:

Access to an object in Active Directory is based on the object’s discretionary access control lists (DACLs), which list the users and groups authorized to access the object and their access levels. You can group objects with similar security requirements into OUs to simplify assignment of permissions to the objects and to facilitate administration and control of network resources. You can assign permissions to objects by using Active Directory Users and Computers, a snap-in for Microsoft Management Console (MMC).

Objects can be referenced by name by using

The most common types of objects in Active Directory are as follows:

TIP


When you use Active Directory Users and Computers to view the property sheet for an object, the Security tab, which displays the Active Directory permissions assigned to that object, is usually not visible. Choose Advanced Features from the View menu to make this tab visible.

TIP


If you have resources such as shared folders or printers on computers that are not running Windows 2000, you must manually publish information about these resources in Active Directory if you want users to be able to locate and access them through Active Directory. You do this by adding the appropriate type of object for that resource to Active Directory and having it point to where the resource is located on the network.

TIP


When you create a new Active Directory object, you usually use a wizard to specify values for the important attributes of the object. You can specify other attributes after the object is created by opening the property sheet for that object.

object in C and C++ programming

A construct containing data as well as methods (functions for manipulating the construct’s data). Object-oriented programming (OOP) focuses on objects instead of functions for manipulating separate data entities. The “blueprint” for an object is a class; a specific object is an “instance” of a class that you access using its associated methods. New classes can be derived from more general classes through a procedure called inheritance. The derived class contains all the methods and data of the original class, which can simplify programming.

object in Performance Monitor

A component or aspect of a server for which you can collect and analyze usage statistics. Examples of objects in the Microsoft Windows NT and Windows 2000 administrative tool Performance Monitor include caches, logical disks, memory, processors, and threads. When an object is monitored, data is collected for every instance of every counter for the object.

See also Performance Monitor

object in Windows NT and Windows 2000

A system resource that can be made available to an application. Examples of objects in Microsoft Windows NT and Windows 2000 include files, printers, memory, devices, windows, threads, and processes. A file object, for example, includes the file’s name and status information, along with a collection of methods for creating, opening, closing, and deleting the object. These methods describe what actions can be performed on the object by the Object Manager, the component of the Windows NT executive that manages resources on a machine running Windows NT or Windows 2000.

object linking and embedding (OLE)

A feature that allows users to create and edit documents that contain objects created by different applications. For example, you can embed bitmap images, sound clips, spreadsheet files, and other objects in Microsoft Word documents.

The term “object linking and embedding” comes from these two types of actions for creating compound documents:

See also OLE

Object Manager

A component of Windows NT executive running in kernel mode that creates, deletes, and manages executive objects (data types that represent system resources) and manages the global namespace for the Microsoft Windows NT and Windows 2000 operating systems.

How It Works

Windows NT and Windows 2000 are considered object-based operating systems because they control access to all system objects (system resources such as files, printers, and threads). Applications running on Windows NT or Windows 2000 cannot manipulate system resources directly—they must ask Windows NT or Windows 2000 to perform the desired action on the object. This feature provides the basis for all Windows NT and Windows 2000 security, including access control, auditing, and memory protection.

All operating system resources in Windows NT and Windows 2000 are implemented as objects, which are abstract representations of the resources that the operating system can manage. The Object Manager performs actions such as creating, monitoring, and securing the object by invoking the object’s methods. The Object Manager also maintains a global hierarchical namespace of all the objects managed by Windows NT and Windows 2000.

OBM

See out-of-band management (OBM)

OC-x

See optical carrier (OC-x) levels

ODBC

See open database connectivity (ODBC)

ODBC logging

A feature of Internet Information Services (IIS) that allows logs of Web site activity to be written directly to a database that is compliant with the open database connectivity (ODBC) protocol. You can analyze the record of Web site traffic stored in the database and generate reports using standard database analysis tools. This is more convenient than logging Web traffic in text files and then importing them into database tables.

TIP


The Usage Import utility of Microsoft Site Server Express supports only the IIS and NCSA log file formats, so if you want to use Usage Import and Report Writer to generate reports of your Web site traffic, don’t use ODBC logging to collect the information—use Microsoft IIS Log File Format or NCSA Common Log File Format instead.

ODI

See Open Data-link Interface (ODI)

offline browsing

A feature of Microsoft Internet Explorer that allows users to browse cached or subscribed Web content when they are not connected to the Internet. Offline browsing is an easy way to browse Web content on a laptop when an Internet connection is not available. Users can surf their history folder to view recently accessed Uniform Resource Locators (URLs). If users click on an unsaved link, they are notified that they are working offline and are asked whether they would like to connect to the Internet to access the resource.

TIP


When you add a Web page to your Favorites list, you can specify that the page be available for offline browsing, indicate how deep you want to be able to browse the page’s links offline, and specify how you want to keep the offline content up to date. To view the site offline later, you can

To leave Work Offline mode, choose Work Offline from the File menu.

Offline Files in Windows 2000

A feature that lets you continue working with shared network resources after you disconnect from the network. Shared files and folders from any computer that supports SMB-based file and print sharing (such as Microsoft Windows 2000, Windows NT 4, Windows 98, and Windows 95) can be made available for offline use by Windows 2000 clients. Windows 2000 clients that are configured to use offline folders can cache the network resources in a local folder. When disconnected from the network, the client can continue working normally on the cached files. The client can then synchronize the contents of the cache with the network share when the connection is restored.

How It Works

To enable offline file support on a computer running Windows 2000, open My Computer and choose Folder Options from the Tools menu. Select the Offline Files tab and check Enable Offline Files.

Specify synchronization options, a cache size, and additional advanced options. To make a share on the network available for offline use, select the share in My Computer (where it might appear as a mapped network drive) or My Network Places (where it will appear as a network share) and choose Make Available Offline from the File menu. The contents of the network share will be copied to the local computer’s cache in a process known as synchronizing. You can specify additional synchronization settings by selecting Settings in the Synchronizing dialog box.

graphic o-1. synchronizing with a network share using offline files in windows 2000.

Graphic O-1. Synchronizing with a network share using Offline Files in Windows 2000.

offline folders in Microsoft Outlook

A feature that allows users to copy the contents of server-based folders to their hard disks or to a network share. Offline folders have a format similar to personal folders, but they have the extension .ost instead of .pst. To copy information to offline folders, you choose Synchronize from the Tools menu on the Outlook toolbar and select the synchronization method that you want to use.

NOTE


In Microsoft Outlook, the following folders are always considered as a group; if one of them is marked for offline use, all of them are:

OLAP

See online analytical processing (OLAP)

OLE

A low-level object-oriented technology based on the Component Object Model (COM) that provides services to applications for creating compound documents.

How It Works

An OLE application can be one or both of the following:

OLE container documents support in-place activation, which allows users to activate an embedded OLE component from within the container document. Activating the component changes the container application’s user interface to include features that allow users to directly edit the component from within the container document.

NOTE


The meaning of the term “OLE” has changed since its first usage at Microsoft. Version 1 of Object Linking and Embedding (OLE), referred to as OLE 1, was created in 1991 and was Microsoft’s first mechanism for creating compound documents. OLE 2, the second version of OLE, improved on OLE 1 and expanded the support for creating compound documents. OLE 2 was based on the model known as the Component Object Model (COM). Microsoft began to recognize that OLE 2 could be used to solve other software problems and that it could be applied to other areas of software development. Microsoft saw OLE 2 as an expandable architecture to create software and, as such, decided to drop the version number. Microsoft also reduced the name from “Object Linking and Embedding (OLE)” to just “OLE,” which had no spell-out. At that time, OLE referred to any technology based on COM. In 1996, Microsoft introduced the name “ActiveX.” Initially, the name “ActiveX” referred to COM-based technologies related to the Internet, which overlapped with OLE. Soon, OLE technologies were being referred to as “ActiveX technologies.” At that time, Microsoft decided to change the name “OLE” back to its original name, “object linking and embedding (OLE),” and once again use it to refer to technologies for creating compound documents and the linking and embedding of objects.

See also ActiveX, Component Object Model (COM), object linking and embedding (OLE)

OLE DB

A set of open, extensible interfaces developed by Microsoft and based on OLE/COM technologies for providing applications with uniform methods of data access in diverse data sources. These data sources can include mainframe databases such as IBM’s Information Management System (IMS) and DB2; server databases such as Microsoft SQL Server and Oracle; desktop databases such as Microsoft Access, Microsoft FoxPro, and Paradox; and non-DBMS information sources such as file systems, spreadsheets, text files, and e-mail. OLE DB defines interfaces that encapsulate various types of database functionality such as record containers, query processors, and transaction coordinators. OLE DB facilitates the development of applications that combine various types of database queries from diverse sources.

How It Works

The architecture of an OLE DB system has three parts:

Because of the standard set of interfaces used in OLE DB providers, any consumer is able to access data from any provider. Furthermore, because providers are COM objects, consumers can access them using any programming language, including C++, Microsoft Visual Basic, and Java.

graphic o-2. the architecture of an ole db system.

Graphic O-2. The architecture of an OLE DB system.

As an example of a provider, the OLE DB Provider for AS/400 and VSAM enables record-level access to mainframe Virtual Storage Access Method (VSAM) files and to the AS/400 native file system. The OLE DB Provider for AS/400 and VSAM is included with Microsoft SNA Server version 4. You use the OLE DB Provider for AS/400 and VSAM to develop applications for discrete data access and for record-level access to physical and logical files on AS/400 systems, in Partitioned Data Sets (PDS’s) and Partitioned Data Set Extended (PDSE) files, and in most versions of VSAM on mainframes. Using the OLE DB Provider for AS/400 and VSAM, programmers can access mainframe VSAM or AS/400 data using Microsoft’s object-based OLE DB data access technology. Programmers can thus access source data from host systems without having to learn about Systems Network Architecture (SNA) or host applications programming. The OLE DB Provider for AS/400 and VSAM facilitates a broad range of data access, from individual records to complete files. Using ActiveX Data Objects (ADO), you can develop web-to-host integration solutions using programming languages such as Microsoft Visual Basic or scripting languages such as Microsoft Visual Basic, Scripting Edition (VBScript), and Microsoft JScript.

OLE DB for OLAP

A set of Component Object Model (COM) interfaces and objects that extends OLE DB to allow access to information stored in multidimensional information sources. OLE DB for OLAP is included in OLE DB 2.0 and leverages the OLE DB architecture to enable online analytical processing (OLAP) functions for COM-based applications.

online analytical processing (OLAP)

A technology that allows users to perform sophisticated data analysis on typically large amounts of enterprise data to gain insight on the information it contains. Examples of analysis include financial modeling, budget forecasting, production planning, and determining broad sales and distribution trends. A query issued in an online analytical processing (OLAP) system could be, “What would be the effect on sales over the next three quarters if the cost of widgets went up 5% while sales dropped 15%?” OLAP systems primarily focus on queries that ask “What if…?” In other words, OLAP systems are designed for making predictions, modeling scenarios, and supporting decision-making.

The database for an OLAP system is structured to allow for efficient retrieval of information. The database can be a data warehouse. A data warehouse is a database that contains static data on a particular subject, drawn from various sources. Queries issued against data warehouses tend to focus on queries that ask “What was…?” or “Who did…?” and are useful for analyzing past sales and growth figures. For example, “What were the total sales for the five largest subsidiaries in the first two quarters of last year?” OLAP systems and data warehouses thus constitute two complementary tools for analyzing and interpreting business data in order to make smart decisions.

An OLAP system is typically based on a multidimensional model, which allows users to easily select, explore, and view the data. An OLAP system generally provides the technology for creating and managing the databases. An OLAP system can have tools to discover relationships between data items by comparing the results of various OLAP queries.

Microsoft SQL Server version 7.0 includes a number of tools for data warehousing and online analytical processing, including Data Transformation Services (DTS) Designer and SQL Server OLAP Services. You can use DTS Designer to specify the workflow steps and transactions for combining multiple heterogeneous data sources into a data warehouse. You can then use OLAP Services to analyze the data, preaggregate data into multidimensional cubes for frequently asked queries, model data, create new views, and perform ad hoc sets of calculations.

On the Web

OLAP Council home page : http://www.olapcouncil.org

OnNow

A power-management design initiative from Microsoft that combines innovation in PC hardware and software to produce a computer that is always on but appears to be off and that responds immediately when a user or application makes a request. For example, an incoming telephone call could wake the computer and start a TAPI-enabled application. OnNow is designed to make personal computers function like appliances in the sense that they respond instantly to user action instead of requiring a warm-up period or boot process. OnNow is based on the Advanced Configuration and Power Interface (ACPI) specification developed by Intel, Microsoft, and Toshiba.

Microsoft Windows 98 directs its power-management functions through the OnNow system. Instead of having the system BIOS control the power state of the system devices and peripherals, OnNow lets the operating system control it. The operating system can place various devices in a sleep state to conserve power and wake them to full power instantly when a user or application issues a request. For OnNow to function as designed, the system must have peripherals and applications that support OnNow power-management functions and the system BIOS must support ACPI.

OpenBSD

A free version of UNIX that is based on the BSD 4.4 operating system and is maintained and supported by a large community of developers. The OpenBSD project is headed by Theo de Raadt, a computer science graduate of the University of Calgary in Alberta, Canada. OpenBSD is widely viewed as one of the most secure UNIX platforms available; even its default installation is fairly hacker-proof. OpenBSD includes support for the Kerberos IV security protocol and Internet Protocol Security (IPSec). OpenBSD also supports binary emulation of most software written for other popular UNIX flavors, such as HP-UX, SunOS, Solaris (SVR4), Linux, and FreeBSD. The current release of the OpenBSD software is version 2.5.

On the Web

OpenBSD home page : http://www.openbsd.org

open database connectivity (ODBC)

A Microsoft database technology that provides an application programming interface (API) that Microsoft Windows–based applications can use to access structured query language (SQL) databases (such as those created and managed with Microsoft SQL Server) over a network.

How It Works

Open database connectivity (ODBC) defines a call-level interface that lets applications access data in any database through the appropriate ODBC driver. The ODBC API allows applications to be independent of the database management systems (DBMS’s) that manage their source data.

The main components of ODBC are as follows:

ODBC, which is based on SQL, provides interoperability by allowing an application to access different SQL DBMS’s by using a common set of code. Developers can thus build client/server database applications without having to pre-specify which DBMS’s will be used for the back end. ODBC uses database drivers to link applications to any ODBC-compliant DBMS. ODBC database drivers are available for more than 50 popular DBMS’s, including SQL Server, Microsoft Access, Microsoft FoxPro, Microsoft Excel, Paradox, dBase, and delimited text files.

With ODBC, applications are not tied to proprietary vendor APIs and can run independently of the underlying data communication protocols. Data can be sent and received in a format suitable for the application instead of being tailored for a vendor-specific DBMS.

You can configure ODBC by using the ODBC utility in Control Panel. This utility lets you define a data source name (DSN) for the database being accessed and drivers for accessing the database. To configure ODBC with this utility, you associate a DSN with an ODBC driver, which lets an application interact with a database that is located either on the local machine or on a network server.

Open Data-link Interface (ODI)

A standard developed by Novell and Apple for defining the communication mechanism between network interface card (NIC) drivers and network protocols. Open Data-link Interface (ODI) allows multiple NICs to be bound to multiple protocols, similar to the network driver interface specification (NDIS) standard. ODI is a legacy standard that was defined primarily for the Internetwork Packet Exchange (IPX) protocol on Novell NetWare 2. x and 3. x networks. Microsoft’s NWLink IPX/SPX-Compatible Transport supports ODI for backward compatibility.

Open Shortest Path First (OSPF) Protocol

A link state routing protocol that is used to exchange routing information between dynamic routers. Open Shortest Path First (OSPF) is an Interior Gateway Protocol (IGP) that is used mainly in larger TCP/IP internetworks and within autonomous systems of the Internet. OSPF is more efficient in terms of network overhead than the Routing Information Protocol (RIP), but it is considerably more complex to plan and implement in an enterprise.

How It Works

OSPF-enabled routers use the Shortest Path First (SPF) algorithm to compute the shortest path between nodes on an internetwork. They create a map (or tree) called the link state database that describes the topology or structure of the router’s specific network area. Network areas are groups of networks connected using OSPF-enabled routers that all have router interfaces for any of the networks included in the area. Areas typically have no more than about 30 or 40 routers and are connected to each other through a designated high-speed contiguous backbone area using area border routers (ABRs). OSPF areas simplify computation of link state information because the computational requirements of calculating link state information rise rapidly as the size and complexity of the network increase. With OSPF areas, each router need maintain only link state information about its own area and other areas connected to it, which improves the scalability of OSPF.

The link state information stored in the database (routing table) of each router includes cost information in addition to hop information. Administrators can configure routers in a complex mesh topology network so that specific paths are preferred over others. The SPF algorithm is used so that routing information can be quickly recalculated if routers are moved or if they go down. This feature is known as Fast Convergence. The SPF algorithm also ensures that the routing tables contain the shortest (least-cost) paths and that routing loops do not occur.

graphic o-3. open shortest path first (ospf) protocol.

Graphic O-3. Open Shortest Path First (OSPF) Protocol.

The link state database of routing information is updated by advertisements using multicasting if a router goes down or if the structure of the network is reconfigured, and the database is used to calculate routes for delivering data over the network. Unlike the older RIP, OSPF uses multicasting to update only routing information, not the entire routing table. And unlike RIP-enabled routers, which broadcast routing information every 30 seconds, OSPF broadcasts changes only when they occur. These features substantially reduce inter-router network traffic compared to RIP and make OSPF a more efficient protocol than RIP for large internetworks.

NOTE


Microsoft Windows NT supports OSPF through the Routing and Remote Access Service (RRAS), which can be downloaded from the Microsoft Web site. OSPF will also be supported natively by Windows 2000.

TIP


When you design an OSPF-based internetwork, you should work from the top down—that is, you should first plan your autonomous system and how it will interact with other autonomous systems, and then you should subdivide the autonomous system into areas and then into individual networks. Try to map your IP address space and subnets to this hierarchy of areas and networks and assign each area a small set of network IDs that can be summarized as a small series of routes. Be sure that areas connect to each other through your high-speed backbone area and not directly to each other. (In other words, avoid back doors.) Specify cost values that relate to the amount of traffic and hardware characteristics of each router.

Open Systems Interconnection (OSI) reference model

An architectural model for open networking systems that was developed by the International Organization for Standardization (ISO) in Europe in 1974. The Open Systems Interconnection (OSI) reference model was intended as a basis for developing universally accepted networking protocols, but this initiative essentially failed for the following reasons:

The U.S government tried to require compliance with the OSI reference model for U.S. government networking solutions in the late 1980s by implementing standards called Government Open Systems Interconnection Profiles (GOSIPs). This effort was abandoned in 1995, however, and now few real-world implementations of OSI networking protocols exist outside of Europe.

The OSI reference model is best seen as an idealized model of the logical connections that must occur in order for network communication to take place. Most protocol suites used in the real world, such as TCP/IP, DECnet, and Systems Network Architecture (SNA), map somewhat loosely to the OSI reference model. The OSI model is a good starting point for understanding how various protocols within a protocol suite function and interact.

The OSI reference model has seven logical layers, as shown in the following table.

The OSI Reference Model

Layer Number Layer Name Description

7

Application layer

Interfaces user applications with network functionality, controls how applications access the network, and generates error messages. Protocols at this level include HTTP, FTP, SMTP, and NFS.

6

Presentation layer

Translates data to be transmitted by applications into a format suitable for transport over the network. Redirector software, such as the Workstation service for Microsoft Windows NT, is located at this level. Network shells are also defined at this layer.

5

Session layer

Defines how connections can be established, maintained, and terminated. Also performs name resolution functions.

4

Transport layer

Sequences packets so that they can be reassembled at the destination in the proper order. Generates acknowledgments and retransmits packets. Assembles packets after they are received.

3

Network layer

Defines logical host addresses such as IP addresses, creates packet headers, and routes packets across an internetwork using routers and Layer 3 switches. Strips the headers from the packets at the receiving end.

2

Data-link layer

Specifies how data bits are grouped into frames, and specifies frame formats. Responsible for error correction, flow control, hardware addressing (such as MAC addresses), and how devices such as hubs, bridges, repeaters, and Layer 2 switches operate. The Project 802 specifications divide this layer into two sublayers, the logical link control (LLC) layer and the media access control (MAC) layer.

1

Physical layer

Defines network transmission media, signaling methods, bit synchronization, architecture (such as Ethernet or Token Ring), and cabling topologies. Defines how network interface cards (NICs) interact with the media (cabling).

You can think of each layer as being logically connected to the same layer on a different computer on the network. For example, the application layer on one machine communicates with the application layer on another machine. But this communication is logical only; physical communication occurs when packets of data are sent down from the application layer of the transmitting computer, encapsulated with header information by each lower layer, and then put on the wire at the physical layer of the transmitting computer. After traveling along the wire, the packets are picked up by the physical layer of the receiving computer, passed up the seven layers while each layer strips off its associated header information, and then passed to the application layer of the receiving computer, where the receiving application can process the data.

See also application layer, data-link layer, network layer, physical layer, presentation layer, session layer, transport layer

optical carrier (OC-x) levels

A set of signaling rates designed for transmission over Synchronous Optical Network (SONET) networks. Optical carrier (OC-x) levels also apply to Asynchronous Transfer Mode (ATM) networks. The term “optical carrier” indicates that SONET runs over fiber-optic cabling. The following table shows some of the common OC-x transmission rates.

OC-x Transmission Rates

Name Rate

OC-1

51.85 Mbps

OC-3

155.52 Mbps

OC-12

622.08 Mbps

OC-24

1.244 Gbps

OC-48

2.488 Gbps

OC-192

9.952 Gbps

NOTE


OC-1 is roughly equivalent to T3 in the T-carrier system. It is a standard SONET Synchronous Transport Signal (STS) transmission rate of 51.85 Mbps. This data transmission rate is known as STS-1. Higher data transmission rates (OC-3, OC-12, and so on) are multiplexed STS-1 transmissions. In other words, OC-3 is three times faster than OC-1 (STS-1).

opto isolator

A device for electrically isolating networking components that are joined by long runs of copper cabling. Opto isolators prevent ground loops from damaging networking components.

How It Works

When a network component or cable transmitting a signal is connected to one port on an opto isolator, the signal is converted briefly into light and then back into an electrical signal before exiting through the other port on the opto isolator. This brief metamorphosis from electric current into light and back again breaks the electrical connection between the two ports of the device, allowing the signal (alternating current) to flow but preventing direct current from flowing along the cable.

Opto isolators are commonly used in RS-232 serial connections between mainframe hosts and terminals connected by long cables. Opto isolation is typically built into line drivers for serial communication, so separate opto isolators are not required.

graphic o-4. opto isolator.

Graphic O-4. Opto isolator.

See also ground loop

Orange Book

Another name for the publication Trusted Computer Systems Evaluation Criteria (TCSEC), published by the National Computer Security Center (NCSC) of the U.S. Department of Defense. Orange Book standards are used to evaluate the security of both stand-alone and network operating systems (NOS’s). The current version of this publication dates from 1985. The Orange Book, which was named for its orange cover, is actually a part of a series of computer system security guidelines and standards that are collectively known as the Rainbow Series.

The Orange Book provides methods of assessing the security of a specific computer system, and it offers hardware and software manufacturers guidance on how to create products that can be certified as secure by the U.S. government and military.

For example, Microsoft Windows NT Server in certain configurations complies with the C2 (Controlled Access Protection) security standards outlined in the Orange Book. C2 is applied not to operating systems but to specifically tested physical computers running those operating systems. C2 is one of a family of security designations that the Orange Book applies to computer systems, which include the following:

organizational unit (OU)

A type of container object in Active Directory of Microsoft Windows 2000 that can contain other Active Directory objects.

How It Works

An organizational unit (OU) can contain other OUs, or it can contain specific objects, such as those listed here:

OUs make possible the hierarchical structure of Active Directory. Objects in the directory are grouped in tree-like structures for easier administration. OUs are displayed in Windows 2000 administrative consoles as folders, much like the folders in a file system that store individual files. OUs are logical groupings of users and resources in a domain; they simplify management of the domain by delegating administrative tasks to specific people.

OUs are often used to duplicate the organizational structure of the company within Active Directory. For example, a company might have OUs named Dev, Marketing, and Sales that represent the network resources of these three departments. OUs can also be assigned according to geographical criteria (New York, Los Angeles, and Detroit, for example) or by administrative function (Accounts, Shares, and Printers). When you run the Active Directory Installation Wizard to install Active Directory on a server running Windows 2000 (thus turning the server into a domain controller), a default hierarchy of OUs is created. This default hierarchy helps you begin administering Active Directory. It consists of the following OUs, which you can display by using Active Directory Users and Computers, a snap-in for Microsoft Management Console (MMC):

graphic o-5. organizational unit (ou).

Graphic O-5. Organizational unit (OU).

The hierarchical structure of OUs in Active Directory also simplifies the task of querying Active Directory for information about network resources. OUs are useful in facilitating administration of Active Directory and therefore in the administration of resources on the network itself. Administrators use OUs to organize users and resources on the network, and to delegate administrative and other rights and permissions to users and groups. The administrator has full access rights on all objects in the directory and can assign permissions to various subtrees of OUs for appropriate users and groups. For any OU, the administrator can delegate either of the following rights to specific users and groups:

Access to objects in Active Directory is based on discretionary access control lists (DACLs), which offer a security model similar to that used in the NTFS file system. Because objects with similar security requirements are grouped into an OU, permissions assigned to the OU are inherited by all objects in the OU. You assign permissions to OUs and other objects by using Active Directory Users and Computers.

NOTE


If several domains are connected into a domain tree, each domain can have its own specifically designed hierarchy of OUs. The structures of domains within a domain tree are independent of one another. However, an OU can contain objects only from its own domain, not from any other domain within a domain tree.

OUs are not part of the namespace of a company, which in Windows 2000 is based on the Domain Name System (DNS). In other words, you can identify a Windows 2000 domain by using a DNS name such as northwind.microsoft.com, but you cannot identify OUs within the domain by using DNS names. However, you can specify OUs by using Lightweight Directory Access Protocol (LDAP) names.

You cannot create new OUs within the four default OUs previously listed. These default OUs simply get you started in administering your network.

TIP


To create new OUs in Active Directory, select the desired parent container in Active Directory Users and Computers, and choose Organizational Unit from the New submenu of the Action menu. You can also use the console toolbar. The only information you need to specify when you create a new OU is its name.

When you create an OU, you should consider who will own and manage it and who will be responsible for the following tasks:

You can create OUs for groups of users who will be assigned similar permissions to network resources. You can also create separate OUs for permanent and temporary employees. You can group shared folders and printers with similar security requirements into OUs.

You should create OUs that are stable and will not change frequently, and you should avoid making the hierarchy of OUs too complicated. In a multidomain scenario with a domain tree, it is usually a good idea to make first-level OUs the same for all domains to provide consistency for the company’s network resources. First-level OUs typically represent the following:

Keep the entire structure of OUs fairly shallow—no more than two or three levels—to ensure good performance when users query Active Directory. A maximum of 10 levels of OUs is recommended.

You can use OUs in place of resource domains, which are used in Windows NT to simplify and centralize administration of network resources. You can also create domain trees with separate domains for resources. You should create new domains instead of OUs if you want to implement different security policies in different locations or branches of your company or in an extremely large enterprise. Otherwise, it is simpler to create only one domain and organize resources and administrative tasks using OUs within that domain.

organization in Microsoft Exchange Server

The root or highest-level administrative unit in Microsoft Exchange Server, which is usually identified by the broadest name that can represent the enterprise’s business—the organization name cannot be changed without reinstalling all servers. An Exchange organization consists of a number of sites, each of which consists of one or more Exchange servers. Sites are connected by connectors such as a Site Connector or Dynamic RAS Connector. You can also use other connectors such as the Internet Mail Service Connector or X.400 Connector to provide messaging connectivity between your Exchange organization and a foreign mail system. Examples of such foreign mail systems include the following:

In the Exchange directory hierarchy, which is displayed in the Exchange Administrator program, the Organization container contains

OS/2

A 32-bit operating system originally developed by IBM and Microsoft as a replacement for MS-DOS. IBM later extended OS/2 to include both server and desktop versions. IBM’s current line of OS/2 software includes the OS/2 Warp Server, the OS/2 Advanced Warp Server, and the OS/2 Warp 4 client. OS/2 Warp in its various forms is a 32-bit preemptive multitasking operating system that supports application, file and print, groupware, and Web server configurations as well as desktop workstations. OS/2 Warp Server includes symmetric multiprocessing support and clustering technologies for high-availability server environments. OS/2 Warp Server supports most common networking protocols and all types of clients, including Microsoft Windows, Macintosh, and AIX clients.

On the Web

OS/2 Warp home page : http://www.software.ibm.com/os/warp

OS/2 subsystem

A component of the Microsoft Windows NT operating system running in user mode that supports the running of OS/2 1. x text-based applications on Windows NT. The OS/2 subsystem is rarely used and is not compatible with the OS/2 Presentation Manager graphical user interface.

In Windows 2000, OS/2 subsystem can be used only on a local computer, and can’t be used from a Terminal Server client computer.

OSI model

See Open Systems Interconnection (OSI) reference model

OSPF

See Open Shortest Path First (OSPF) Protocol

OU

See organizational unit (OU)

Outlook Web Access

A component of Microsoft Exchange Server that works with Internet Information Server (IIS) version 4 and Active Server Pages (ASP) technology to allow Exchange users to access their e-mail, address books, and public folder content using a standard Web browser such as Microsoft Internet Explorer. More generally, Microsoft Outlook Web Access allows administrators to publish Exchange services on the Web. It uses Hypertext Transfer Protocol (HTTP) on the client side and remote procedure calls (RPCs) on the server side.

out-of-band management (OBM)

A method of remotely managing the wide area network (WAN) telecommunications components of your network by using a secondary serial communication link. These devices are typically routers, switches, or Channel Service Unit/Data Service Units (CSU/DSUs) that establish and maintain WAN links to the corporate network. Devices that can be managed out-of-band usually have an RS-232 port or some other serial port for remote control of their functions.

How It Works

In a typical setup, a remote PC is connected by a modem through a phone line to a code-operated switch located at the office local area network (LAN). This switch controls networking and telecommunication devices such as routers, bridges, switches, CSUs, and even power supplies through their RS-232 serial connections. Alternatively, the modem might be connected directly to a remote modem connected to the device being managed. In either case, the result is a separate low-cost dial-up circuit connecting the administrator and the network devices that is independent of the main network connection, which is usually a more expensive T1 or other leased line. The administrator can thus access the WAN device from a remote location even when the WAN link itself is down, and can troubleshoot the problem from off-site. Out-of-band management (OBM) also allows administrators to access and configure WAN devices without disturbing the WAN link itself. In other words, OBM functions “out of the bandwidth.”

graphic o-7. out-of-band management (obm).

Graphic O-7. Out-of-band management (OBM).

For example, you can use OBM functions on a power supply to remotely reboot or reset your network devices when they go down. You can use out-of-band switches to select different serial interfaces remotely over a modem by issuing simple ASCII commands to different devices. You can even use OBM to remotely configure and control devices on your network. OBM devices are a useful part of a network disaster recovery plan.

For networking devices that you can configure and troubleshoot using out-of-band connections, you usually perform management tasks by connecting to a serial port (also called the setup port or configuration port) either locally with a cable or remotely through a modem. You usually use text-based commands from a terminal emulator program such as Windows HyperTerminal, which can emulate a VT100 terminal. You can often control access using passwords for extra security.

NOTE


OBM offers an advantage over in-band management systems such as Simple Network Management Protocol (SNMP) management systems. SNMP employs the network itself for communication, so if the WAN link goes down, the remote station cannot use SNMP to determine the problem because SNMP functions only if the WAN link is working.

OBM is often used as a backup system for in-band SNMP management, when the devices have limited SNMP support, or when the cost of an SNMP management system cannot be justified. You can often manage a device in-band by using a remote Telnet client for entering the same commands that are used in OBM.

TIP


You can often use out-of-band transmission so that a device that enters a problem state calls an administrator’s pager via a modem. The administrator can then dial in to the device remotely and correct the problem. Some network devices include built-in modems and data switches for remote OBM.

out-of-band signaling

Any transmission technology in which signaling is separate from the data being transmitted. Out-of-band signaling uses one or more channels for transmitting data or voice information and one special out-of-band channel for performing signaling functions such as establishing and terminating the communication link, controlling flow, or transmitting error information. The out-of-band channel can be

The opposite of out-of-band is in-band, in which signaling information is sent over the same channel as the data transmission. Out-of-band transmission is usually considered a better choice than in-band transmission for the following reasons:

NOTE


Out-of-band circuits are often used for out-of-band management (OBM) of wide area network (WAN) devices. These are usually physically separate dial-up lines.

See also out-of-band management (OBM)

owner

In the NTFS file system, the person ultimately responsible for the permissions assigned to a file, usually the creator of a file. By default, the owner of a file has permission to modify the object’s discretionary access control list (DACL) by granting users and groups permissions for various objects.

A file always has an owner. Ownership creates a trail of accountability for the file. The ownership of a file on an NTFS volume can be changed in two ways:

In the Microsoft Windows 2000 operating system, objects in Active Directory also have owners. The user who creates an object in Active Directory becomes the object’s owner. The owner controls the permissions for the object and its attributes. Ownership of an object in Active Directory can be changed in ways similar to those for a file on an NTFS volume.



Microsoft Encyclopedia of Networking
Microsoft Encyclopedia of Networking
ISBN: 0735613788
EAN: 2147483647
Year: 2000
Pages: 37
Authors: Mitch Tulloch, Ingrid Tulloch
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net