The digital telecommunications services backbone system of Europe, a format standardized by the International Telecommunication Union (ITU). E-carrier services were developed in the 1970s and became widely available in the 1980s. E-carrier services can be used for wide area network (WAN) connections, for high-speed Internet connections, for private videoconferencing services, and for public frame relay services. E-carrier services are generally available wherever the parallel T-carrier services are not.
E-carrier transmissions are graded E1, E2, and so on in order of increasing transmission speeds. These different service grades are multiples of the basic DS0 data transmission rate, similar to the T-carrier system of North American telecommunications carriers.
The E-carrier service rates are specified by the organization CEPT (Conférence Européenne des Administration des Postes et des Télécommunications, or European Conference of Postal and Telecommunications Administrations). The most popular of these services, E1, is also the slowest. E1 transmits data at speeds of up to 2.048 Mbps over two pairs of twisted wires. It consists of 31 separate 64-Kbps DS0 channels multiplexed together, each of which can carry either a voice conversation or a stream of data. E1 is sometimes referred to as 2-Meg.
Graphic E-1. E-carrier.
The E-series transmission rates are shown in the table included in the article on DS0 elsewhere in this work. E-carrier lines use 8 bits per channel for encoding signals and do not rob bits for control signals as T-carrier lines do.
NOTE
If the E1 service entering your customer premises needs to connect directly to a different building, you have two solutions. First, you could have the service provider extend the E1 line to the other building, thus moving the demarcation point (termination point) of the line. This could be costly, however. A simpler solution might be to connect the E1 line to a fiber-optic line driver, lay down a fiber-optic cable from the line driver to a similar driver in the other building, and then connect the remote line driver to your E1 equipment.
A command-line tool for versions 4.0 and 5.0 of Microsoft Exchange Server. Edbutil can be used to defragment, repair, and check the integrity of the following Exchange Server databases:
Directory database (dir.edb)
Private information store database (priv.edb)
Public information store database (pub.edb)
Edbutil works at the Joint Engine Technology (Jet) level and attempts to find and repair inconsistencies. It can also be used to defragment these databases, resulting in a database size reduction.
NOTE
In Exchange Server version 5.5, the edbutil utility has been replaced by the newer tool eseutil.
TIP
Use this utility with caution, and make sure that you have backed up the information store and directory databases first! Microsoft recommends using this utility only when troubleshooting Exchange Server problems in consultation with Microsoft Technical Support.
See Enhanced Data Rates for Global Evolution (EDGE)
A device in an Asynchronous Transfer Mode (ATM) network that routes data between an ATM backbone network and local area networks (LANs). Edge routers can be used to translate Ethernet or Token Ring data for transmission over ATM backbones. This allows ATM to be used as a backbone for connecting multiple LANs into a metropolitan area network (MAN) or wide area network (WAN). An alternative and more commonly used configuration is to connect LAN networking equipment directly to ATM backbone switches, which provide points of contact with an ATM provider’s backbone network. An edge router can function as an ATM switch and provide routing capabilities for LAN networking protocols—all in one hybrid device.
Graphic E-2. Edge router.
See electronic data interchange (EDI)
In Microsoft Windows NT and Windows 2000, the cumulative permissions a user has for accessing a resource based on his or her individual permissions, group permissions, and group membership. The effective permissions a user experiences trying to access a file or folder depend on the various permissions granted to the user expressly or by virtue of their membership in a particular group. When a permissions conflict exists between one group and another, or between the user and a group, rules are applied that resolve the issue.
How It Works
In networks based on Windows NT or Windows 2000, calculation of effective permissions can be determined using three simple rules:
First, if a user belongs to two (or more) groups, and these two groups have different NTFS standard file permissions on a given file, the user’s ability to access the file both locally and over the network is determined as follows:
The effective NTFS permission is the least restrictive (most permissive) NTFS standard permission. For example,
read (NTFS) + change (NTFS) = change (NTFS)
The exception to this is that the no-access permission overrides all other permissions. For example,
read (NTFS) + no access (NTFS) = no access (NTFS)
Second, if a user belongs to two (or more) groups, and these two groups have different shared folder permissions on a given shared folder, the user’s ability to access the shared folder over the network is determined as follows:
The effective shared folder permission is the least restrictive (most permissive) shared folder permission. For example,
read (shared folder) + change (shared folder) = change (shared folder)
The exception to this is that the no-access permission overrides all other permissions. For example,
read (shared folder) + no access (shared folder) = no access (shared folder)
Third, when a user attempts to access a folder or file over a network that has both NTFS permissions (the first example) and shared folder permissions (the second example) configured on it, the effective permission is the most restrictive (least permissive) permission. For example,
read (NTFS) + change (shared folder) = read (combined)
See also NTFS permissions (Windows 2000), NTFS permissions (Windows NT), shared folder permissions
See Encrypting File System (EFS)
See Exterior Gateway Protocol (EGP)
See Electronic Industries Alliance (EIA)
Standards for commercial and telecommunications wiring developed by the Electronic Industries Alliance (EIA) and Telecommunications Industry Association (TIA). These standards are also supported by the American National Standards Institute (ANSI). The EIA/TIA wiring standards actually consist of a group of standards covering different aspects of premise cabling and other wiring practices. These standards include the following:
EIA/TIA 570: Residential/Light Commercial Wiring Standard
EIA/TIA 568A: Commercial Building Telecommunications Cabling Standard
EIA/TIA 569: Commercial Building Standard for Telecommunications Pathways and Spaces
EIA/TIA 606: Design Guideline for Administration of Telecommunications Infrastructure in Commercial Buildings
EIA/TIA 607: Commercial Building Grounding and Bonding Requirements for Telecommunications
For more information, see the Web sites for the EIA and TIA listed in this entry.
TIP
When installing wiring for your network, be sure to follow the EIA/TIA standards, both for legal reasons and to ensure that your network will function as expected. Be sure also to follow any local or state building codes.
On the Web
•
Electronic Industries Alliance (EIA) : http://www.eia.org
•
Telecommunications Industry Association (TIA) : http://www.tiaonline.org
See browser election
Electrical noise induced in cabling by the presence of nearby electrical equipment such as motors, air conditioners, fluorescent lights, and power lines. Electromagnetic interference (EMI) can interfere with the transmission of signals.
EMI is only a problem with copper cabling. It’s caused when the changing electromagnetic fields generated by one cable induce extraneous currents or interference in adjacent or nearby cables. EMI in copper cabling can be reduced to acceptable levels by
Avoiding bunching of unshielded cabling
Keeping all cabling away from power cords and transformers
Using shielded twisted-pair (STP) cabling instead of unshielded twisted-pair (UTP) cabling
Enclosing cabling in external mesh or wire shielding
Properly grounding electrical equipment and external shielding
Taking care not to excessively untwist the terminating ends of twisted-pair cabling
EMI can be a greater concern in heavy industrial settings where high voltages and equipment, such as motors and generators, produce high levels of electrical noise. Using coaxial cabling in these settings affords greater resistance to the effects of EMI than using twisted-pair cabling. Fiber-optic cabling is an even better solution in heavy industrial settings because it is wholly resistant to EMI. (Changing electromagnetic fields have no effect on the light waves traveling along a glass fiber.)
A standard format developed by the Data Interchange Standards Association (DISA) in which companies can exchange business data and financial transactions. Electronic data interchange (EDI) is defined in the American National Standards Institute (ANSI) standard called X.12.
How It Works
The basic unit of an EDI transmission is the message, which consists of a transaction set with a header and footer attached. A transaction set is roughly equivalent to a typical business form, such as a purchase order, and consists of a number of data segments, each containing various fields delimited by some character. These fields represent individual elements of the business transaction, such as company name, account number, quantity, and so on; they are formatted according to a standard code. This code is implemented as a map between your business application’s data fields and the type of EDI standard that is appropriate for the transaction being performed.
EDI data can originate from any computing level, from mainframe to local area network (LAN) server. Systems communicate through EDI translation software that formats the data into standard EDI encoding and exchange information—either through a direct dedicated link between business partners or through an external third-party value-added network (VAN) service provider that acts as a clearinghouse for EDI transactions. If a VAN is used, as it normally is, the VAN processes EDI messages and routes them to the appropriate electronic mailbox for the destination business partner, who can then retrieve the EDI messages from the mailbox and process the transactions using business applications.
On the Web
•
Data Interchange Standards Association (DISA) home page : http://www.disa.org
The main trade organization representing the U.S. high-tech community. The Electronic Industries Alliance (EIA) was founded in 1924 as the Radio Manufacturers Association. It plays an important role in enabling U.S. electronics producers to be competitive by developing technical standards, hosting trade shows and seminars, performing market analysis, and facilitating relations with the government. The EIA represents a broad spectrum of U.S. electronics manufacturing interests.
The EIA is organized along the lines of specific electronic products and markets, with each sector, group, or division having its own board of directors and its own agenda for enhancing competitiveness. Major divisions include the components, consumer electronics, electronic information, industrial electronics, government, and telecommunications divisions.
An important computer networking function of the EIA is the series of standards for residential and commercial network cabling that are collectively known as the EIA/TIA wiring standards. Individuals and companies installing cabling for computer networks must follow these standards in order to comply with government legal and safety requirements.
On the Web
•
Electronic Industries Alliance (EIA) home page : http://www.eia.org
Stands for electronic mail; any system for sending and receiving messages over a network. E-mail originated in the early 1970s with ARPANET and is now the primary method of business communication today.
Many vendors and organizations have developed electronic messaging standards and formats, including the IBM mainframe host-based PROFS and SNADS messaging systems, Microsoft Mail, Lotus cc:Mail, and Novell GroupWise. The two most popular messaging formats used today are the Internet Simple Mail Transfer Protocol (SMTP) and X.400 mail systems.
X.400 is a popular messaging format that is used throughout much of Europe, but SMTP mail, which was developed in the United States as part of the ARPANET project, enjoys worldwide popularity and acceptance. Both systems are based on a client/server architecture, with messaging clients sending e-mail to mail servers that act as message transfer agents by routing messages through a backbone of mail servers to their final destination. Microsoft Exchange Server is Microsoft’s premiere e-mail messaging server software, and combined with the Microsoft Outlook client, it makes a full-featured messaging and collaboration system. Microsoft Exchange Server supports interoperability with most existing messaging systems, including SMTP, X.400, Microsoft Mail, and Lotus cc:Mail.
Any of several types of addresses that ensure an e-mail message reaches its intended recipient. An e-mail address must contain sufficient information so that the message can be routed to its specific recipient. There are various kinds of e-mail address formats depending on the e-mail system in use. Address formats typically include at least two parts:
A user portion, which indicates the name or alias of the user to whom the mail is directed
A routing portion, which indicates the information needed to route the message to the particular mail system on which the user has his or her mailbox
The following table shows some examples of e-mail address formats.
E-Mail Address Formats
Type of Address | Example |
SMTP (Internet) | BobS@Northwind.Microsoft.com |
Microsoft Mail | Northwind/MICROSOFT/BOBS |
Lotus cc:Mail | BobS at Northwind |
X.400 | C=US;a=SPRINT;p=Microsoft;o=Northwind;s=BobS |
A recovery tool for repairing missing or corrupt files or restoring the registry on a Microsoft Windows NT or Windows 2000 system. Having a current copy of the emergency repair disk for each server on your network is an important part of preparing for disaster recovery.
How It Works
An emergency repair disk (ERD) contains compressed versions of registry hive, default user profile, setup.log, and other system configuration files. An ERD can be created any time using the rdisk utility, and should always be created after installing new services or software or upgrading hardware or device drivers on a system.
An ERD cannot be used to boot a computer running Windows NT or Windows 2000. To perform a system recovery of a machine running Windows NT using an ERD, boot your system using the three boot floppies and select the Repair option from the appropriate menu. Then select the specific repair options you want to perform, namely
Inspect Registry Files: Prompts to replace each registry file
Inspect Boot Sector: Restores Windows NT boot sector
Inspect Startup Environment: Restores the boot.ini file to allow access to Windows NT
Verify Windows NT System Files: Replaces missing or corrupt operating system files
To perform a system recovery on a machine running Windows 2000, try booting to Safe Mode first by pressing the F8 function key during startup. If this fails or if the system cannot be repaired, boot the system using the four boot floppies, select the Repair option by pressing the R key when prompted, and then either use the ERD to attempt a repair or press C to open the Recovery Console. The Recovery Console is a powerful command-line interface to the operating system, designed for use by advanced administrators only.
TIP
If you can’t find your three Windows NT boot floppies, you can create a new set by running the command winnt32/ox from the Windows NT compact disc on a working computer running Windows NT. To create the four Windows 2000 boot floppies, insert the Windows 2000 compact disc and a blank floppy into any machine running MS-DOS or Windows, click Start, select Run, and enter the following path into the Run box:
<cdrom_drive>\bootdisk\makeboot a:
A startup disk created during a Microsoft Windows 95 or Windows 98 setup that can be used to troubleshoot Windows 95 and Windows 98 boot problems. Having a current copy of the emergency startup disk for each machine running Windows 95 or Windows 98 on your network helps with disaster recovery if these machines fail to boot properly.
The emergency startup disk contains files necessary to load a command-line version of Windows 95 or Windows 98, plus other useful system-recovery utilities, including a real-mode registry editor. When you insert an emergency startup disk into your computer and reboot, the computer starts from the disk instead of from your hard drive.
TIP
You should create a new emergency startup disk whenever you make a configuration change to a machine running Windows 95 or Windows 98—for example, when you install new hardware or update device drivers.
See electromagnetic interference (EMI)
Generally, a process by which a lower-layer protocol receives data from a higher-layer protocol and then places the data into the data portion of its frame. Thus, encapsulation is the process of enclosing one type of packet using another type of packet. Encapsulation at the lowest levels of the Open Systems Interconnection (OSI) reference model is sometimes referred to as framing. Examples of encapsulation include the following:
An Ethernet frame that encapsulates an Internet Protocol (IP) packet, which itself encapsulates a Transmission Control Protocol (TCP) packet, which then encapsulates the actual data being transmitted over the network
An Ethernet frame encapsulated in an Asynchronous Transfer Mode (ATM) frame for transmission over an ATM backbone
The data-link layer (layer 2) of the OSI model for networking is responsible for encapsulation or framing of data for transmission over the physical medium. In local area network (LAN) technologies, this is usually Carrier Sense Multiple Access with Collision Detection (CSMA/CD) for Ethernet networks. For wide area network (WAN) technologies, the data-link protocols used depend on whether the communications are point-to-point or multipoint:
For point-to-point communications, possible WAN data-link protocols include Point-to-Point Protocol (PPP) and High-level Data Link Control (HDLC) protocol.
For multipoint communications, possible WAN data-link protocols include frame relay, ATM, Switched Multimegabit Data Services (SMDS), and X.25.
A Microsoft Windows 2000 core technology for storing encrypted NTFS files on disk; designed to protect data on NTFS volumes from local access by unauthorized users.
How It Works
Encrypting File System (EFS) is a public key cryptography scheme based on the Data Encryption Standard (DES) that runs as a Windows 2000 system service and is transparent to the user. EFS is simple to use and automatically generates an encryption key pair for the user who is logged on if one does not already exist. The user’s private key, stored in Active Directory, is used for decrypting encrypted files and folders.
Each time EFS encrypts a file or folder, it generates a random encryption key. EFS encrypts this encryption key using the user’s public key. EFS stores encryption keys in the nonpaged pool of memory.
To access an encrypted NTFS file, the user must meet one of the following criteria:
Have the private key for the file (in other words, the file was originally encrypted by that user)
Have permission to share the encrypted file
Be a registered recovery agent
You can encrypt or decrypt a file or folder on an NTFS volume with the Advanced button on the General page of that file or folder’s property sheet. You can also enable or disable encryption from the command prompt using the cipher command.
NOTE
EFS does not work on FAT volumes.
TIP
If you are working with applications that create temporary files, you might want to enable encryption at the folder level instead of the file level in order to guard against unauthorized access to your temporary files. With folder-level encryption, all files in the folder are encrypted.
The process of rendering a message (or data) unusable to all but the intended recipients, who have the ability to decrypt it. Cryptography is the science of creating workable procedures for encrypting and decrypting messages. The goal is to ensure that a message intercepted by a distrusted user cannot be decrypted in a feasible amount of time.
How It Works
Although there are many different approaches to encryption, the two most common are
Symmetric key encryption: This method uses a secret key known only to the sender and recipient of a message (and perhaps to others that they trust). The secret key is used both to encrypt the message when it is sent and to decrypt it when it is received. The actual encryption process involves mathematically combining (hashing or transforming) the message and the key in some complex fashion that is virtually impossible to undo unless the recipient also has the key. Symmetric key encryption is very secure, but suffers from one problem—if you want to send a message to someone who does not have your key, you must also find a way to securely give them a copy of the key. This difficulty makes symmetric key encryption generally unworkable for electronic communication over a network or telecommunications service, except where only the original sender and recipient will need the key. For example, symmetric key encryption works in cellular phone communication when only the subscriber and the service provider need a copy of the user’s key.
Public key encryption: This method is now commonly used in many computer networking and telecommunications systems for transmitting sensitive information using the Secure Sockets Layer (SSL) protocol—for example, sending credit card numbers over the Internet. SSL establishes a secure communications session over the Internet by using public key encryption, which provides every participating user with a public key and a private key. Users are the only ones aware of their private keys, while their public keys are generally available to anyone who wants them. Remember that if a message is encrypted with a user’s public key, it can be decrypted only with the same user’s private key, and vice versa.
For example, if user A wanted to send an encrypted message to user B, it would typically work like this:
User A requests user B’s public key or obtains this key from a certificate authority (CA) that both users trust.
User A encrypts his message using user B’s public key and sends the encrypted message to user B.
User B receives the encrypted message from user A and decrypts it with user B’s private key.
Graphic E-3. The public key encryption method.
NOTE
The preceding approach outlines the steps used for encrypting and decrypting the actual message being transmitted during a secure communication session. A different approach, called a digital signature, is used to confirm the authenticity of the sender and the integrity of the message. Digital signatures are encrypted in a reverse fashion to the message itself. Specifically, if user A wants to send his digital signature to user B, then
User A creates a hash of his message using a hashing algorithm. This hash forms the basis of the digital signature, which user A then encrypts using his own private key.
User A appends the encrypted digital signature and his own public key to the message, which is then encrypted using user B’s public key.
User B receives the message and attachments, decrypts its contents using her own private key, and uses user A’s public key to decrypt the digital signature that user A attached to the message. User B then generates a hash of the received message and compares this to the digital signature that user A sent. If the two are identical, it is unlikely that the message has been tampered with in transit.
See also public key cryptography
A mathematical procedure for encrypting data. Encryption algorithms form the basis by which encryption can take place and are fundamental to cryptography.
How It Works
Encryption algorithms generally use some kind of mathematical key (chosen from a large set of available keys) to transform plaintext (the data being encrypted) into ciphertext (the resulting encrypted data). An encryption algorithm must be reversible so that the recipient can use another mathematical key to decrypt the data in order to read it. A good encryption algorithm is difficult to decrypt if you don’t know the decrypting key. It might take massively parallel computers centuries (or aeons) of intense computing, trying all possible keys, to decrypt a typical message without knowing the specific decryption key.
Encryption algorithms typically perform their encryption process on multibyte segments of data instead of on one byte at a time. Such an algorithm is referred to as a block cipher. For example, the Data Encryption Standard (DES) algorithm, a 56-bit key algorithm used for many years by the U.S. government, encrypts data 8 bytes at a time.
A type of contract between a computer software publisher and the purchaser of the software that outlines the various rights granted to the purchaser for the legal use of the software. The End-User License Agreement (EULA) for a software product is usually found on a separate piece of paper accompanying the product, inside the front cover of the user manual, or on screen prior to installing the software. You should read and become familiar with the terms of your EULA for the software you purchase. Failure to follow the terms of the EULA might open you or your company to prosecution for software piracy.
TIP
You can access the EULA for Microsoft Windows 98 by opening the text file license.txt. It is located in the \Windows folder. In Windows 2000, the file is called eula.txt and is located in the \System32 folder.
On the Web
•
Microsoft antipiracy site : http://www.microsoft.com/piracy
Sometimes referred to as CAT5E, an informal cabling standard that some cable manufacturers use to refer to category 5 cabling that is capable of supporting transmission speeds faster that 100 Mbps. At present, there is no official standard for unshielded twisted-pair (UTP) cabling above category 5, although category 6 and category 7 specifications have been proposed. In other words, there is no standard or specification that has been agreed upon for defining category 6 or higher UTP cabling, although steps are being made to develop one.
How It Works
Enhanced category 5 cabling has certain electrical characteristics that make it the recommended type of cabling for most new networking installations. Supporting frequencies up to 350 MHz or higher, it is typically 4-pair solid conductor 24-gauge UTP cabling that has a low capacitance in the range of 13 to 14 pF/ft, as compared with regular category 5 cabling that has a capacitance of around 17 pF/ft. Its impedance is 100 ohms, the same as for regular category 5 cable. CAT5E cabling is suitable for Fast Ethernet installations, Integrated Services Digital Network (ISDN) wiring, 155-Mbps Asynchronous Transfer Mode (ATM) networks, and other present and proposed high-speed networking solutions such as 1000BaseT.
TIP
If you plan to use enhanced category 5 cabling in your network, you should make sure that all your other wiring components match these specifications. This means purchasing and installing enhanced category 5 patch panels, wall plates, and other components. Also, be sure to strictly follow wiring guidelines because improper installation of enhanced category 5 cabling will result in loss of potential bandwidth. The real key to operating a successful high-speed UTP wiring system is careful installation.
A proposed upgrade to the hardware for the General Packet Radio Service (GPRS) packet-switched wireless mobile data service. Enhanced Data Rates for Global Evolution (EDGE) is designed to provide mobile users with wireless roaming data services of up to 400 Kbps.
EDGE can be deployed by many Global System for Mobile Communications (GSM) providers as an upgrade for existing GSM systems within the GSM Phase 2+ initiative, which is planned for the years 2000–2001. GSM networks do not require new network elements to implement EDGE, although some hardware and software upgrades will be required. EDGE uses a different modulation technique called phase-shift keying that allows it to provide higher data rates than existing GSM systems over reduced areas of coverage.
EDGE can be deployed on both circuit-switched and packet-switched cellular services. In North America, EDGE can be deployed by Time Division Multiple Access (TDMA) cellular providers under the IS-136 standard. Initial test deployments are planned for the year 2000.
See also General Packet Radio Service (GPRS)
A large company, geographically distributed with a large number of users. In this context, an enterprise-level network of computers refers to the network belonging to an enterprise; that is, a network that typically consists of thousands of computers distributed across several geographically remote locations and connected by WAN links.
Enterprise-level networks generally use the TCP/IP protocol and are divided into a number of smaller networks called subnets, which are joined using routers. Enterprise-level networks are often heterogeneous networks consisting of different protocols and operating systems such as Microsoft Windows NT and Windows 2000, Novell NetWare, and varieties of UNIX, all interoperating to various degrees. Enterprise-level networks can include legacy mainframe and minicomputer systems as well.
This mixture of systems and protocols can make it challenging to administer and manage an enterprise-level network and offers a good argument for upgrading legacy systems to newer, standardized ones. Companies can save considerable costs in the long run by upgrading their networks to secure, reliable, scalable network operating systems such as Windows NT and Windows 2000. The initial cost of upgrades and training are quickly recouped through lower maintenance and administration costs, the result of migrating an enterprise’s heterogeneous combination of systems and protocols to a homogeneous network consisting of computers running Windows NT or Windows 2000, and running TCP/IP.
A built-in group for the Microsoft Windows 2000 operating system platform. Enterprise Admins is one of four predefined global groups that Windows 2000 creates by default to help administrators organize users in their network. The other three groups are Domain Users, Domain Guests, and Domain Admins. While Domain Admins are those users who can perform administrative tasks on any computer belonging to the domain, the Enterprise Admins group is intended to have an even larger scope. Enterprise Admins need to be able to perform administrative tasks on any computer in the enterprise. A Windows 2000–based enterprise can consist of a number of domains interconnected in a domain tree, or even several domain trees connected into a domain forest. Enterprise Admins can administer the entire network for the enterprise. Just as with the Domain Admins group, the Enterprise Admins group has one initial member: the Administrator user account that belongs to the local domain.
A general term describing the entirety of the business functions of an enterprise. Enterprise resource planning (ERP) includes tasks such as planning, purchasing, tracking orders, supplying customers, managing inventory, servicing customer requests, producing financial reports, and bookkeeping.
ERP software is modular software designed to integrate these various business functions and simplify their management. ERP software typically consists of an integrated suite of tools for performing standard line-of-business functions such as payroll, accounting, inventory management, and order entry. ERP software is used in transportation and automotive businesses, industrial environments, and other large industrial settings. ERP software lets these large businesses manage diverse business resources across the enterprise in order to plan more effectively for growth and expansion.
Because most business data is stored in databases, ERP software usually depends on the database-management program used. Microsoft SQL Server forms a robust and scalable foundation on which to build ERP software.
A designated server running Microsoft Windows NT or Windows 2000 in an enterprise, which is used as a central repository for software licensing information regarding Windows NT, Windows 2000, or Microsoft BackOffice. An enterprise server is typically a primary domain controller (PDC) but can also be a stand-alone server that is not part of any domain in the enterprise. All PDCs in the enterprise replicate their licensing information with the enterprise server, so the enterprise server contains a master database of this information. If there is only one domain in the enterprise, the PDC for that domain is the master licensing server. If there are several domains, each domain’s PDC keeps track of licenses for that domain, and all PDCs then replicate their licensing information to the specifically designated enterprise server. Stand-alone member servers that are not part of any domain also need to replicate their licensing information with the enterprise server.
NOTE
You can have more than one enterprise server in your enterprise, but it is simplest to have only one because enterprise servers cannot replicate with each other.
See also License Manager
Components of the Microsoft Windows NT or Windows 2000 operating system that support the running of applications from different operating system architectures. Environmental subsystems provide the necessary “environment” in which these applications can run. They are an essential part of the Windows NT operating system that enables cross-platform support for applications written for different operating systems. Windows NT and Windows 2000 include the following environmental subsystems:
Win32 subsystem for running 32-bit Windows applications
OS/2 subsystem for running OS/2 1.X character-based applications (does not support the OS/2 Presentation Manager GUI or Warp versions)
POSIX subsystem for running POSIX.1-compliant applications
NOTE
MS-DOS-based applications run on Windows NT in the context of a Win32 application called a Virtual DOS Machine (VDM) that emulates an MS-DOS environment.
String variables containing information that an operating system uses to control services and applications. The PATH and TEMP variables used in the autoexec.bat file in MS-DOS were early examples of environment variables. Microsoft Windows NT and Windows 2000 offer a more extensive selection. For example, environment variables for Windows NT include the following:
System (predefined) environment variables such as USERNAME, USERDOMAIN, WINDIR, and HOMEPATH. These variables are set on the system no matter who logs on and cannot be changed by any user. They specify particular parameters pertaining to the system itself, such as the location of the operating system files. They can be used in logon scripts because they are always present when any user logs on.
Graphic E-4. Environment variables of Windows NT.
User (user-defined) environment variables, such as the path to application files. User environment variables take precedence over system environment variables when the two conflict.
Autoexec.bat environment variables, such as those used in path statements.
You can view and specify environment variables in Windows NT and Windows 2000 by using the System utility in Control Panel. Environment variables may be used in logon scripts by enclosing them within percent symbols; for example, %USERNAME% contains the currently logged on user name.
NOTE
The System utility in Control Panel shows only a portion of the system environment variables defined on a system running Windows NT or Windows 2000.
See emergency repair disk (ERD)
See enterprise resource planning (ERP)
A command-line tool for version 5.5 of Microsoft Exchange Server. Eseutil can be used to defragment, repair, and check the integrity of the following Exchange Server databases:
Directory database (dir.edb)
Private information store database (priv.edb)
Public information store database (pub.edb)
Eseutil works at the Joint Engine Technology (Jet) level and attempts to find and repair inconsistencies. You can also use eseutil to defragment these databases, resulting in a database size reduction.
NOTE
Eseutil replaces the earlier utility edbutil that was used with Exchange Server versions 4 and 5.
TIP
Use this utility with caution, and make sure that you have backed up the information store and directory databases first! Microsoft recommends using this utility only when troubleshooting Exchange Server problems in consultation with Microsoft Technical Support.
Stands for SMTP Service Extensions, an extension to the Simple Mail Transfer Protocol (SMTP) protocol that lets receiving SMTP hosts inform sending hosts of the extensions that it supports. ESMTP requires no modification of the SMTP configuration of either the client or the mail server.
How It Works
Instead of beginning the session with the helo command, the receiving host issues the ehlo command. If the sending host accepts this command, the receiving host then sends it a list of SMTP extensions it supports. The sending host then knows which SMTP extensions it can use to communicate with the receiving host.
NOTE
The Internet Mail Service for Microsoft Exchange Server version 5.5 supports ESMTP. The ESMTP standard is defined in Request for Comments (RFC) number 1869.
The most popular network architecture for local area networks (LANs). Ethernet was originally developed by Xerox in the 1970s and was proposed as a standard by Xerox, Digital Equipment Corporation (DEC), and Intel in 1980. A separate standardization process for Ethernet technologies was established in 1985 in the Institute of Electrical and Electronics Engineers (IEEE) 802.3 standard known as Project 802. The IEEE standard was then adopted by the International Organization for Standardization (ISO), making it a worldwide standard for networking. Because of its simplicity and reliability, Ethernet is by far the most popular networking architecture used today. It is available in three different speeds:
10 Mbps, which is simply called Ethernet
100 Mbps, which is called Fast Ethernet
1000 Mbps or 1 Gbps, which is an emerging standard called Gigabit Ethernet
How It Works
Ethernet specifications define the functions that occur at the physical layer and data-link layer of the Open Systems Interconnection (OSI) reference model, and package data into frames for transmission on the wire. Ethernet is a baseband networking technology that sends its signals serially one bit at a time. It operates in half-duplex mode, in which a station can either transmit or receive, but cannot do both simultaneously.
Ethernet uses the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) media access control method for determining which station can transmit at any given time over the shared medium. In an Ethernet network, each station (computer) listens to the network and transmits data only if no other stations are currently using the network. If the wire is free of signals, any station that wants to can contend (try to take control of) the network in order to transmit a signal. Ethernet networks are thus based on the concept of contention and operate on a first-come, first-served basis, rather than relying on a master station that controls when other stations can transmit. If two stations try to transmit data at the same time, a collision occurs, and both stations stop transmitting. They wait a random interval of time (measured in milliseconds) and then try again.
The more stations on an Ethernet network, the higher the number of collisions, and the worse the performance of the network. Typical performance of a 10-Mbps Ethernet network with around 100 stations will support a bandwidth of only about 40 to 60 percent of the expected value of 10 Mbps. One way of solving the problem of collisions is to use Ethernet switches to segment your Ethernet network into smaller collision domains.
Ethernet stations transmit their data over the wire in packages called frames. An Ethernet frame has a minimum size of 64 bytes and a maximum size of 1518 bytes. A total of 18 bytes are used for information such as source and destination addresses, network protocol being used, and other frame overhead. Thus, the maximum payload size (amount of data carried) for an Ethernet frame is 1500 bytes. There are four different Ethernet encapsulation methods by which Ethernet packages data into a frame:
Ethernet II (used for TCP/IP)
Ethernet 802.3 (called Raw 802.3 in Novell networking, and used for connectivity with NetWare 3.11 and earlier)
Ethernet 802.2 (also called Ethernet 802.3/802.2 without SNAP [subnetwork access protocol], and used for connectivity with NetWare 3.12 and later)
Ethernet SNAP (also called Ethernet 802.3/802.2 with SNAP, and created for compatibility with Macintosh and TCP/IP systems)
Ethernet can use virtually any physical networking topology and cabling system (medium). Although a star topology (stations wired in a star-like fashion to a central hub) is often used from the physical point of view, all Ethernet networks are logical bus topology networks at heart. One station places a signal on the bus, and that signal travels to every other station on the bus.
Ethernet is available in three different speeds and can be further differentiated by media and other considerations, as shown in the following table.
Ethernet Speeds, Types, Standards, and Specs
Speed | Type of Ethernet | IEEE Standards | IEEE Specs |
10 Mbps | Ethernet | 10Base2 10Base5 10BaseF 10BaseT | 802.3 |
100 Mbps | Fast Ethernet | 100BaseFX 100BaseT 100BaseT4 100BaseTX | 802.3u |
1000 Mbps or 1 Gbps | Gigabit Ethernet | 1000BaseCX 1000BaseLX 1000BaseSX 1000BaseT | 802.3z |
NOTE
Ethernet media specifications such as 10BaseT look strange and obscure, but can be easily interpreted. For example, 10BaseT means 10 -Mbps baseband transmission over twisted-pair cabling media.
A new type of Ethernet technology that solves the problems of collisions and has twice the bandwidth of traditional Ethernet is called full-duplex Ethernet. Full-duplex Ethernet uses two pairs of wires with Ethernet switches to allow stations to simultaneously send and receive data without collisions. On a 10BaseT wired network, each full-duplex Ethernet station would have a transmission bandwidth of 20 Mbps.
Graphic E-5. The Ethernet II frame format.
TIP
The various Ethernet framing formats are incompatible with each other, so if you have a heterogeneous Ethernet network, you need to specify the correct frame type in order for machines running Microsoft Windows NT to see your Novell NetWare servers. Windows NT allows you to select Auto Detect from the Frame Type drop-down list on the NWLink IPX/SPX-Compatible Transport protocol configuration property sheet if you don’t know what frame type your NetWare servers are using. (In Windows 2000, select the check box next to Auto Frame Type Detection in the NWLink IPX/SPX/NetBIOS-Compatible Transport protocol configuration property sheet.) You might also need to configure your routers for the proper frame type. Older Cisco routers running Internetwork Operating System (IOS) version 10 or earlier do not support Ethernet 802.3/802.2 with SNAP.
The following table shows some troubleshooting tips for Ethernet media problems.
Troubleshooting Tips for Ethernet Media Problems
Problem | Suggestion |
No link integrity | Check that you have not mismatched 10BaseT and 100BaseT (or 100BaseTX and 100BaseT4) cables, hubs, or network interface cards; make sure no crossover cables are used for station-to-hub cable connections. |
Too much noise | Check for damaged cables; make sure you are using category 5 (CAT5) cabling (or enhanced category 5 cabling for 100BaseT) and that all your cabling interface components (patch panels, wall plates, terminal blocks, and so on) are CAT5 certified. |
Too many collisions (greater than 0.1 percent of total frames on the network) | Check for unterminated cables using a time-domain reflectometer; use a protocol analyzer to look for a jabbering transceiver (a network interface card that is continually broadcasting); and make sure you don’t have any cables exceeding the maximum specified length. |
On the Web
•
Charles Spurgeon’s Ethernet Web site : http://www.ots.utexas.edu/ethernet
See also 10Base2, 10Base5, 10BaseT, 100BaseT, Fast Ethernet, Gigabit Ethernet
See MAC address
Sometimes simply called a switch (when referring to Ethernet networking hardware), a networking component used to connect workgroup hubs to form a larger network or to connect stations that have high bandwidth needs. Ethernet switches provide superior performance to hubs but are more expensive.
How It Works
In a hub, which basically functions as a multiport repeater, a packet entering one port is regenerated and passed to every other port. As a result, if you try to connect several workgroup local area networks (LANs) by uplinking their hubs to a main hub, the new larger network remains a single collision domain. With the increased number of nodes on the network, more collisions will occur, and network traffic congestion can result. If a 10-Mbps Ethernet hub has 10 ports, each port effectively gets one-tenth of the total bandwidth, or 1 Mbps.
A solution to this congestion problem is to use an Ethernet switch in place of the main hub. When a signal enters a port of the Ethernet switch, the switch looks at the destination address of the frame and internally establishes a logical connection with the port connected to the destination node. Other ports on the switch have no part in the connection. The result is that each port on the switch corresponds to an individual collision domain, and network congestion is avoided. Thus, if a 10-Mbps Ethernet switch has 10 ports, each port effectively gets the entire bandwidth of 10 Mbps—to the frame, the switch’s port appears to provide a dedicated connection to the destination node. Ethernet switches are capable of establishing multiple internal logical connections simultaneously, while routers generally process packets on a first-come, first-served basis (although this distinction is blurring in newer hardware).
There are two main types of Ethernet switches:
Layer-2 switches operate at the data-link layer (or layer 2) of the Open Systems Interconnection (OSI) reference model and are based on bridging technologies. They establish logical connections between ports based on MAC addresses. Use layer-2 switches for segmenting your existing network into smaller collision domains to improve performance.
Layer-3 switches operate at the OSI network layer (or layer 3) and are based on routing technologies. They establish logical connections between ports based on network addresses. Use these for connecting different networks into an internetwork. Layer-3 switches are sometimes called routing switches or multilayer switches.
Some manufacturers also refer to their newest switches as layer-4 switches, but these are essentially an enhanced form of layer-3 switch that takes into account some higher-level protocol information in routing traffic.
The actual mechanism by which switching occurs divides Ethernet switches into two general device classes:
Store-and-forward switches buffer whole incoming frames, perform error checking, and switch the packet to the correct port according to the internal address table of the switch. This is similar to how bridges work, but this mechanism suffers from high latency (delay) as the frame is processed.
Cut-through switches read only the source and destination addresses of an incoming packet, check the address table, and switch the packet to the correct port. Error checking is not performed—which speeds up performance but results in bad packets being processed rather than dropped. This kind of switching has extremely low latency but can cause problems by forwarding jabbers throughout the network.
Ethernet switches are also distinguished in other ways, such as by the number of ports they have, whether they operate in half-duplex or full-duplex mode, their transmission speed (for example, 10 Mbps, 10/100 Mbps, or 100/1000 Mbps), ports for connectivity with high-speed Fiber Distributed Data Interface (FDDI) backbones, and so on. Advanced features can include Simple Network Management Protocol (SNMP), out-of-band management (OBM), and custom packet filtering.
Although Ethernet switches relieve traffic congestion by segmenting collision domains, they do have some disadvantages:
They are generally several times more expensive than hubs of the same speed.
Networks involving switches are more difficult to monitor and troubleshoot.
Here is a good rule of thumb for deciding whether to incorporate switches into your existing network: switches can improve your network’s performance if the current network utilization level is higher than 35 percent or if collisions are running at more than 10 percent. For starters, replace your main hub in a cascading hub topology network with an Ethernet switch and connect servers that are heavily utilized directly to the switch (see diagram).
Graphic E-6. Ethernet switch.
TIP
If users in a department have high bandwidth needs, such as those running CAD or multimedia applications, consider replacing their workgroup hub with an Ethernet switch, or if the number of users is small, connect their stations directly to the main Ethernet switch.
Another use for Ethernet switches is to connect 100-Mbps Ethernet “islands” to an existing 10-Mbps Ethernet LAN. Simply use a 10/100-Mbps Ethernet switch with two ports to connect them.
You can also connect two LANs several kilometers apart by using two Ethernet switches, both having one 100BaseT port and one 100BaseFX port. Connect the switches to the LANs, and then connect a fiber-optic cable between the FX ports.
When purchasing Ethernet switches, make sure they have RMON agents built into each port, as this will considerably ease remote network troubleshooting.
See End-User License Agreement (EULA)
Types of occurrences that are logged by the Event Log service of Microsoft Windows NT or Windows 2000 and can be viewed using the administrative tool called Event Viewer. There are five basic types of events:
Errors: These events represent some significant problem that can lead to loss of data or functionality in the operating system, such as failure of a service to start upon reboot. The corresponding symbol in the system or application log is a red stop sign.
Warnings: These events indicate some impending problem such as low remaining disk space. The corresponding symbol in the system or application log is an exclamation point superimposed on a yellow circle.
Information: These events indicate that some significant system operation has successfully occurred; for example, a service has successfully started. The corresponding symbol in the system or application log is an information sign—that is, the letter “i” superimposed on a blue circle.
Successes: These events are recorded only in the security log and represent auditing information concerning the successful completion of attempts to access secured resources, such as when a user successfully logs on to the network.
Failures: These events are recorded only in the security log and represent auditing information concerning failed attempts to access secured resources, such as when a user attempts to access a shared folder and fails.
A Microsoft Windows NT administrative tool used to monitor events on a server. Events are significant actions that take place on a server and include the following:
A process has been completed, such as the defragmentation of a database.
A service has been started, stopped, or paused.
A service has issued an unexpected response to a client.
A service was unable to start.
A memory violation has occurred, resulting in an application being terminated.
Event Viewer records events in three different logs:
System log: Records warnings, errors, and information events about Windows NT services and devices
Security log: Records success and failure events for objects being audited
Application log: Records warnings, errors, and information events about applications running on the server
The system and application logs should be monitored regularly for signs of problems with devices, services, or applications running on the server. When a problem occurs, Event Viewer is the first place you should check. If auditing is configured on the server, you can monitor the security log for signs of attempted unauthorized access (failure audits) or for an indication of resource usage (success audits).
Graphic E-7. Event Viewer.
NOTE
In Windows 2000, Event Viewer is implemented as a snap-in for Microsoft Management Console (MMC) and appears as one of the administrative tools in Control Panel. The Windows 2000 Server version of Event Viewer includes additional logs such as the directory service log, the DNS server log, and the file replication service log. Windows 2000 Event Viewer is extensible, with additional logs present when new network services are installed on the machine.
TIP
Select View, and then select Filter Events to filter out unwanted events when the Event Viewer logs are large.
A system group existing on all Microsoft Windows NT and Windows 2000 servers and workstations. The Everyone group includes all local and remote users who have access to any computer running Windows NT on which the Everyone group is defined. This includes users from untrusted domains and non–Windows NT networks. By default, the Everyone system group has the sole preassigned system right “Access this computer from network.” Additional rights can be granted to this group if desired. You cannot modify the membership of system groups such as the Everyone group directly.
NOTE
The Everyone group is one of seven built-in system groups that are defined on networks based on the Windows 2000 operating system.
TIP
When you share a folder on a server running Windows NT, full control permission is initially assigned to the Everyone group. It is a good idea to remove this group and assign appropriate permissions to other groups, such as Administrators and Users.
Be careful about assigning additional permissions to the Everyone group. If you allow users who do not have valid user accounts to access the network using the Guest account, they will gain any permissions and rights that you have assigned to the Everyone group.
See also built-in group, special identity
The primary tool for managing the sites, servers, services, and recipients in a Microsoft Exchange organization. The Exchange Administrator program can be installed on a computer running Microsoft Exchange Server during setup, or as a stand-alone administrative tool on a server or workstation running Microsoft Windows NT or Windows 2000, provided that the machine can establish a remote procedure call (RPC) connection with all Exchange servers it wants to administer.
The Exchange Administrator program provides a view of the Exchange directory hierarchy for the organization. Using the menus, toolbars, and property sheets for directory objects, administrators can configure all aspects of their Exchange sites, services, connectors, gateways, recipients, and other Exchange components. Exchange Administrator provides a two-pane view similar to Windows Explorer, including
Container pane (left): Displays all container objects in the organization’s directory hierarchy.
Contents pane (right): Shows the contents of the currently selected container in the container pane. The contents of a container can be leaf objects, other containers, or both.
Graphic E-8. Exchange Administrator.
One of the four core components of Microsoft Exchange Server. The Exchange directory service is responsible for maintaining the Exchange directory database of information concerning the organization’s sites, servers, services, and recipients. This directory is based on the X.500 directory recommendations of the International Telecommunication Union (ITU) and is essentially a Lightweight Directory Access Protocol (LDAP)–compliant directory.
To synchronize the information among all servers, the directory service also replicates the directory information among all Exchange Server computers in an Exchange organization through directory replication. This replication takes place automatically every five minutes among Exchange servers in the same site and when the administrator has scheduled it to occur between different sites. The Exchange directory service is implemented as a Microsoft Windows NT service and can be stopped, started, or paused like any other service. Errors that occur in the directory service are written to the application log on the Exchange server.
NOTE
The directory service agent for Windows 2000 can integrate information maintained by the Exchange directory service with Active Directory in Windows 2000.
A Microsoft Windows NT service running on Microsoft Exchange Server version 5.5 computers. This service can be configured using Microsoft Outlook to monitor for occurrence of specific events in public folders. These events include timing events, message postings, and message deletions. The event service notifies users of specific actions that occur on public folders. This allows developers to write custom workflow applications that perform specific actions when a specific event occurs in a public folder. Developers can write scripts using the Exchange Scripting Agent to trigger responses to messages being posted in both public folders and users’ mailboxes.
TIP
When writing mailbox agents that use the event service, use high-level programming languages such as C or C++. If you write mailbox agents using an interpreted language such as Microsoft Visual Basic, Scripting Edition (VBScript), Exchange Server will slow to the speed of the interpreter whenever the script is called by a message being posted to the mailbox. This can cause a significant drop in performance.
Sets of rights assigned to users or groups to control access to directory objects in the organization of Microsoft Exchange Server. These rights are grouped into common roles, which are then assigned to users and groups.
Exchange permissions can be assigned to any object in the Exchange directory hierarchy and are inherited by other objects below that object, provided they are in the same context.
The following table shows the individual rights that can be granted to users and groups to control access to directory objects. Note that not all of these rights are available for any given directory object.
TIP
If you don’t see the Permissions property page for an Exchange directory object, use Options from the Tools menu of the Exchange Administrator program to make it visible. (The screen capture illustrates the property sheet for the Toronto site in an Exchange organization.)
Graphic E-9. Exchange permissions.
Individual Rights
Right | Type of Permission Granted |
Add Child | Create objects within a container. |
Modify User Attributes | Modify user-level attributes of an object. |
Modify Admin Attributes | Modify administrator-level attributes of an object. |
Modify Permissions | Modify the permissions on the existing object. |
Delete | Delete the object. |
Logon | Access the directory database (needed by Exchange service account). |
Replication | Replicate directory information with other servers (needed by Exchange service account). |
Mailbox Owner | Read and delete messages in the mailbox. |
Search | View the contents of the container. |
Send As | Send a message using the sender’s return address. |
A tool for Microsoft Exchange Server that allows server-side scripts to be written that execute actions when specific events or conditions occur in public folders. These events include timing events, message postings, and message deletions. For example, an action could be triggered in response to generation of an Out-of-Office (OOF) message. Another example of such an event is the automatic generation of a reminder message when a user doesn’t read his or her e-mail for a specified number of days. A form that is submitted to a public folder could be validated by a script that determines whether it satisfies some specific criteria, such as a minimum order quantity. Scripts can be written in Microsoft Visual Basic, Scripting Edition (VBScript) or JScript using the Exchange Scripting Agent.
See Microsoft Exchange Server
See Windows NT executive
A Microsoft Windows NT and Windows 2000 command that can be used to uncompress files from the distribution files on the Windows NT compact disc. Use this command to perform a system recovery when a missing or corrupt Windows NT operating system file is preventing your system from booting. Expand is an MS-DOS–based utility.
Example
expand d:\i386\sol.ex_ c:\winnt\system32 installs Solitaire the hard way—off the Windows NT compact disc.
NOTE
The Windows NT Resource Kit includes a Windows NT–based expansion utility called expndw32.exe that can be accessed from the File Tools program group in the Start menu.
For the full syntax of this command, type expand /? at the command line.
A Microsoft Windows NT or Windows 2000 server that exports directories and files to other computers using the Directory Replicator Service in Windows NT and Windows 2000. The export server contains the master copy of the directory tree that is being copied to the import servers by the Directory Replicator Service.
In Windows NT, configure your export server using the Replication button on Server Manager, which is accessed either from the Server icon in Control Panel or from the Start menu’s list of administrative tools. You must specify the following:
The particular directory tree to be exported. The default tree is
%SystemRoot%\System32\Repl\Export
The domains or computer names to which you want to export the tree
Selected subdirectories that you do not want to replicate by applying locks to them (optional)
In Windows 2000, the directory replication functionality is integrated into Active Directory.
TIP
In Windows NT, if you add any domain or computer names to the To list box for directory replication, you are no longer automatically replicating to the local domain and must specify the name of the local domain (if desired).
See also Directory Replicator Service
A physical disk partition on which a series of logical drives can be created. You can create an extended partition on a disk to overcome the limitation of having only four partitions per disk.
Information about the various partitions on a disk is stored in a structure called the partition table. The partition table is 64 bytes in size and is located on cylinder 0, head 0, sector 1 of your hard drive, in the same sector as the Master Boot Record. The partition table has the same format no matter what operating system is used on the disk. Up to four partitions can be created on a disk, but only one partition can be extended per disk. In Microsoft Windows NT, you can create an extended partition using Disk Administrator. For earlier Windows platforms, use the fdisk utility.
NOTE
In Windows 2000, extended partitions can be created only on basic disks.
See also partition of a disk
A general name for a class of networking devices that extend the distances over which stations (computers) can typically be connected to concentrators such as hubs and switches.
An example is a 10BaseT extender for Ethernet networks. In 10BaseT networks, stations should be located no more than 100 meters from a hub, but by using an extender, you could increase this to about 183 meters. A 10BaseT extender can thus be used for connecting a remote station, such as a station located in a nearby building, to the network. Extenders are essentially a simplified form of bridge designed to support only a few remote stations. They need to be installed in pairs, one at the remote location and one at the main network. Some extenders can be used to carry network data over installed phone lines, connecting remote stations without installing additional network cabling.
Graphic E-10. Extender.
Extenders are also available for increasing the maximum connection distance for other data transmission technologies such as the Small Computer System Interface (SCSI) bus. A normal SCSI bus is limited to about 6 meters, but a fiber-optic SCSI extender can increase this distance to a kilometer or more using duplex fiber-optic cable. You can use parallel extenders for directly connecting to printers located in a different building. You can use serial extenders to connect computers to remote RS-232 serial test equipment located in laboratories in different buildings.
A cable used to extend a length of cabling. Extension cables come in all types with various connector devices and can be used to extend serial lines, parallel lines, network cables, power cables, and so on.
TIP
Extending a cable using an extension cable is not always a good idea because the additional interface introduced by the connection usually results in some signal loss. Furthermore, extending network cables can cause problems if the new, longer cable exceeds the maximum length of the specifications for that type of network. For example, extending unshielded twisted-pair (UTP) cabling beyond 100 meters in a 10BaseT Ethernet network can result in unreliable communication between hosts on the network.
A type of routing protocol used to distribute routing information between different autonomous systems in large internetworks based on the TCP/IP protocol. The Internet is one example of an Exterior Gateway Protocol (EGP). EGPs specify how networks within an autonomous system are advertised to routers outside the given autonomous system. EGPs thus facilitate the exchange of inter-autonomous-system routing information between different autonomous systems, independent of whether these autonomous systems employ the same Interior Gateway Protocols (IGPs) within their networks.
The EGP was the original routing protocol developed for communicating routing information between autonomous systems on the Internet. It is no longer used because of its poor support for multipath networking environments, and the Border Gateway Protocol (BGP) has replaced it. The term “Exterior Gateway Protocol” now refers both to the particular protocol itself and to the class of protocols it describes.
See also autonomous system (AS)
The Windows Cabinet Extraction tool for Microsoft Windows 95 and Windows 98 that is used to extract files and lists of files from Windows cabinet files. These cabinet files are found on the Windows CD. The extract command lets you extract one or more files from the cabinet files—for example, if a system file becomes corrupt and you want to replace it rather than rerun Setup.
Example
To display the contents of the cabinet file Win95_02.cab, type extract /d win95_02.cab at the command prompt.
In its simplest form, a private TCP/IP network that securely shares information using Hypertext Transfer Protocol (HTTP) and other Internet protocols with business partners such as vendors, suppliers, and wholesale customers. An extranet is thus a corporate intranet that is exposed over the Internet to certain specific groups that need access to it. Extranets built in this fashion follow the client/server paradigm, with Web servers such as Microsoft Internet Information Services (IIS) functioning as the server, and Web browsers such as Microsoft Internet Explorer functioning as the client. Other extranet models exist, however, such as a peer-to-peer business connection for electronic data interchange (EDI).
Extranets are a powerful tool because they let businesses share resources on their own private networks over the Internet with suppliers, vendors, business partners, or customers. Extranets are typically used for supporting real-time supply chains, for enabling business partners to work together, or to share information such as catalogs with customers. The power of the extranet is that it leverages the existing technology of the Internet to increase the power, flexibility, and competitiveness of businesses utilizing well-known and easily used tools such as Web servers and Web browsers. Extranets also save companies money by allowing them to establish business-to-business connectivity over the Internet instead of using expensive, dedicated leased lines. Extranets can also save money by reducing phone and fax costs.
How It Works
Peer-to-peer extranets between business partners typically use virtual private networks (VPNs) to establish secure, encrypted communication over the unsecured public Internet for the transmission of sensitive business information, such as EDI between partners, or between headquarters and branch offices. These extranets act as dedicated gateways between business partners and generally do not allow private access to individual users. Peer-to-peer extranets can use Internet Protocol Security (IPSec) with a public key infrastructure (PKI) to provide IP-based authentication and encrypted transmission of information.
Client/server extranets have different requirements, as individual users need to be authenticated before receiving secure, encrypted access to company resources. Instead of authenticating on the basis of IP addresses as in peer-to-peer extranets, users must be authenticated using user accounts or digital certificates mapped to accounts. Client/server extranets might support HTTP access only or might allow other client/server applications to run. Encryption for HTTP access is performed using the Secure Sockets Layer (SSL) protocol.