Stands for business-to-business and refers to e-commerce between different companies that have some sort of partnering arrangement, in contrast to B2C, or business-to-consumer, relationships in which individuals or companies purchase the products or services of another company.
Overview
Companies traditionally negotiate special business relationships with other companies that can provide them with the raw materials, tools, and services that they need for the success of their businesses. Such relationships are known as a value chain, which typically includes activities such as obtaining raw materials, processing these materials into finished products, shipping products to distributors, servicing customers, and marketing. To support a value chain, several business activities are essential, including procurement, research and development, manufacturing, and managing of human resources, operations, finances, and customer needs.
B2B is basically the use of the Internet to streamline and automate these business processes to enhance the value chain. This can result in streamlined business- cycle processes that are faster-to-market and in substantial cost savings by eliminating traditional paper-based invoicing and communications used in procurement channels. B2B can benefit companies in many different scenarios, including corporate purchasing, supply chain trading, and direct marketing.
Architecture
The technologies at the heart of B2B are the Internet, virtual private networks (VPNs) and Extensible Markup Language (XML). The Internet now provides a ubiquitous communications infrastructure that allows companies anywhere to connect with each other for exchange of business information. This can be accomplished through a variety of means, including leased lines, xDSL, dial-up modem connections, and wireless satellite links. Just as the existing public switched telephone network (PSTN) catalyzed the explosive growth of fax technology after it was introduced, the Internet is revolutionizing the way business partners communicate to buy and sell goods and services.
VPNs are a popular technology that is widely used to secure communications over the Internet. Without the Internet itself, business partners would have to purchase costly leased lines for secure, reliable electronic communications between them, and many companies still use leased lines to support their Electronic Data Interchange (EDI) platforms. Using VPNs, however, companies can send these communications securely over the public Internet, allowing them to reduce costs by eliminating leased lines in favor of better-positioned technologies such as xDSL.
XML is a third component of most emerging B2B solutions platforms, as it provides a standardized way of encoding business communications for transmission over the Internet.
In addition to these technologies, other elements of successful B2B relationships include establishing credit relationships between companies and building B2B technology into legacy systems.
An emerging standard that may help promote B2B overall is an initiative from Ariba, Microsoft, and IBM called Universal Description, Discovery, and Integration (UDDI). UDDI is a proposed directory service that will make it easier for companies to find business partners that offer specific types of goods and services.
Implementation
You can implement B2B in three basic ways: build a custom solution, buy a packaged solution, or lease services from an online marketplace.
Building a custom B2B solution in conjunction with business partners is an approach that is often taken by large companies that require custom solutions that are integrated deeply into their existing legacy business systems and that have pockets deep enough to implement this type of solution. The disadvantage is the longer time-to-market period required for realizing benefits from this solution, and with the rapidly changing Internet economy this is a concern that needs to be seriously addressed by enterprise e-implementers. B2B solution providers pursuing this market segment are basically pursuing a vertical market in which they will handle a small number of large clients with extensive integration needs.
Buying an off-the-shelf B2B solution is another approach that can take several forms, from purchasing and deploying a software platform for developing B2B solutions such as Microsoft BizTalk Server to hiring a B2B consulting company to implement its own off-the- shelf solution. This approach is often taken by mid- sized companies with reduced capital availability and limited IT (information technology) resources, and especially so by dot-com startups seeking rapid time-to- market. A startup company might outsource all of their procurement needs to a B2B consulting service that will implement a packaged Web-based system for procurement and supply-chain management for them.
Leasing services from an existing B2B exchange is a third solution. Numerous online marketplaces supply B2B services for narrowly targeted market segments such as the food industry and the plastics industry. These B2B exchanges (or online marketplaces) provide packaged B2B solutions that include online catalog publishing services, secure transactions, direct marketing, and related services. An example is the food industry, where a B2B exchange can help grocery store chains manage procurement and speedy delivery of perishable goods.
A B2B exchange with a specific industry focus such as this is often called an Industry-Sponsored Marketplace (ISM), and a B2B solution provider with a more general focus of providing packaged B2B solutions for small-sized or mid-sized companies is generally referred to as a "pure player." These providers are competing in a horizontal market-that is, trying to gain as many customers as they can-and most first-generation B2B marketplaces took this approach to growing their ventures. Many of them provide B2B services on a transaction-fee basis, though there's movement away from this model toward flat-rate pricing that makes B2B costs more predictable for clients.
B2B exchanges come in all flavors, from online shopping portals such as the healthcare industry portal PointStore, to industry-partnered ventures in which several companies form a cooperative exchange such as Hyatt International Corporation and Marriott International's Avendra marketplace for the hospitality industry, to pure-play independent B2B exchanges such as Chemdex for the chemical industry built on B2B software from Commerce One and Ariba. Of these different approaches, the most successful ventures are generally the cooperatives in which the narrow industry focus and high alignment with partner needs generate the best results.
Marketplace
Commerce One and Ariba are two major players in the B2B marketplace arena, and between them they have more than 500 corporate customers. Ariba has partnered with IBM and i2 Technologies to provide software and services, and Commerce One has done the same with SAP AG.
Some of the bigger players in the ISM market include
e2Open: An online marketplace for high technology supported by IBM, Nortel Networks, and others.
Altrade: A B2B exchange developed by Altra Energy Technologies for the energy industry that includes high-profile partners such as Dow Chemical Company and ExxonMobil Corporation and which did over $4 billion in trades in 1999.
Covisint: An online supply-chain procurement marketplace being developed by the Big Three automakers Ford Motors, General Motors, and DaimlerChrysler.
Companies that provide full-featured packaged B2B platforms include Ironside Technologies, Yantra Corporation, and many others.
Prospects
The future of the emerging B2B market overall is probably bright despite the shakeout of many startups that occurred in 2001. Many early proponents followed the horizontal market strategy of building one-size-fits-all B2B exchanges and then trying to attract customers along the "build it and they will come" paradigm. Unfortunately, most larger companies have legacy business systems that require a great deal of customization to participate effectively in B2B, and, as a result, most public B2B exchanges attracted only small and mid-sized companies whose resources were limited.
The main issues that tend to make many companies slow to jump on the bandwagon of public B2B exchanges are the unpredictable costs of transaction-based fees for involvement in these marketplaces, the complexity of integrating B2B solutions into existing supply chain systems (especially for companies that have progressed little in developing Web-based intranet and extranet solutions for their businesses), and issues relating to branding and customer loyalty that make suppliers reluctant to offer their wares at cut-rate prices in the new online marketplaces. As a result, successful B2B exchanges tend to be those that can build community-that is, a group of buyers and sellers loyal to one another. Private exchanges (those built upon preexisting business relationships) thus tend to fare well but offer few avenues for market growth for suppliers involved, and public exchanges offer a way of helping suppliers find new markets and new customers.
Another issue that has restrained many from the wholesale plunge into B2B is the snake-oil syndrome: new technologies breed startups that offer end-to-end solutions that are ready to implement "yesterday." Due diligence is required of companies contemplating aligning themselves with a B2B solution or platform, and decision-makers should obtain financials and customer testimonials to avoid getting caught in the web of fly-by-night operations that are here today and gone tomorrow.
With the failure of numerous public B2B marketplaces, companies that were early adopters are taking a more cautious view of further involvement, so that while recognizing the need to pursue B2B solutions in order to compete in the future economy, they are now more effectively taking care in investigating the financial viability of exchanges before jumping on board again. Nevertheless, while getting your company involved with a specific B2B provider is a tactical solution that requires good thought and due diligence, getting your company involved generally in B2B solutions is a strategic requirement for any company that hopes to survive in the Internet economy that is here and yet to come.
Notes
Microsoft Corporation has its own internal B2B solution called the Microsoft Market, which allows employees to quickly and easily procure goods and services from a wide variety of partner businesses. Microsoft Market has enabled Microsoft to lower average procurement costs by more than 90 percent.
Many B2B marketplaces provide procurement services based on either forward (sell-side) auctions which benefit suppliers or reverse (buy-side) auctions in which buyers submit a Request for Quotation (RFQ) and wait for the lowest bid to come in from suppliers. These services have not been as successful as anticipated, however, mainly because companies generally negotiate trusted long-term contractual business relationships with partners rather than just bid for the best-priced solution.
See Also BizTalk Server 2000 ,Commerce Server 2000 ,Digital Subscriber Line (DSL) ,electronic data interchange (EDI) ,Microsoft Market ,Universal Description,Discovery,and Integration (UDDI),virtual private network (VPN)
Stands for business-to-consumer, relationships in which individuals or companies purchase the products or services of another company.
See Also B2B
The portion of a network that ties different departmental networks into a single whole.
Overview
Backbones are primarily used in medium to large networks, such as those occupying a building or a group of buildings on a campus. The backbone carries the bulk of the network traffic and must be designed accordingly. Backbone designs generally fall into two basic categories:
Distributed backbone: Refers to using cabling to join different departmental networks in a bus topology or mesh topology. This cabling is referred to as backbone cabling, and it connects the hubs, switches, or routers of each network into a single whole. In a typical scenario, each floor or building might have a local area network (LAN) and wiring closet containing, among other things, a main hub or router. Backbone cabling is then run between floors or buildings, connecting the main hub or router for each department into a bus-style network (see illustration).
Collapsed backbone: Refers to using cabling to directly join each departmental network's main hub or router using backbone cabling to a central hub, switch, or router in a star topology (see illustration). The central unit is often referred to as the collapsed backbone, although this term properly describes the entire configuration. The central unit can be located in the building's main equipment room or, in a campus scenario, in the IS (Information Services) department's building.
Backbone. Two basic types of network backbone: distributed and collapsed.
Distributed backbones generally have a greater degree of fault tolerance than collapsed ones, because the collapsed backbone unit forms a single point of failure. However, collapsed backbones usually have better traffic flow than distributed backbones because of the underlying star topology. Collapsed backbones generally offer better performance because of the reduced number of hops that traffic must make when passing between departmental LANs. Collapsed backbones are also easier to manage because they bring all the backbone switching and routing equipment into a single room or building. Collapsed backbones are used frequently for connecting departmental LANs within a single building, but less often for connecting building LANs across a campus network because of the increased distances and cabling costs.
Backbone cabling should have the highest bandwidth of any cabling in your network, since backbones are used to join together hubs, switches, and routers, linking departmental LANs or subnetworks into building-wide or campus-wide internetworks. In buildings, backbone cabling often refers to the vertical cabling running through the risers or elevator shafts that connects the hubs and switches in each floor's wiring closet. Depending on performance requirements, anticipated growth, and cost, any of the following might be suitable for backbone cabling:
Category 5 (Cat5) unshielded twisted pair (UTP) cable
Type 1A shielded twisted pair (STP) cable
Thinnet coaxial cabling
Multimode fiber-optic cabling
Single-mode fiber-optic cabling
Notes
The term backbone is also used to refer to the collection of networking components (cabling, hubs, switches, and routers) that form the supporting network into which workgroup and departmental LANs are connected. A mesh topology is often used for network backbones to provide fault tolerance for critical high-speed data paths.
You should put considerable thought and planning into the design and implementation of your network's backbone, because the overall performance of networking services is largely dependent on the backbone's bandwidth and reliability. Design your backbone with network expansion in mind. Planning for growth is especially important if the cost of cable reinstallation is high. Fiber-optic cabling is preferred for most network backbones because of its high bandwidth, security, and resistance to electromagnetic interference.
See Also collapsed backbone
Sending messages between similar messaging systems by using an intermediate messaging system of a different type.
Overview
A simple backboning example is the connecting of two or more Lotus cc:Mail postoffices using a Microsoft Exchange Server organization as the messaging backbone. By installing the cc:Mail Connector on Exchange Server, messaging connectivity can be established with connected cc:Mail postoffices. Messages can then be routed from one postoffice through the Exchange organization to other postoffices on the network.
Another example of backboning is connecting different sites in an Exchange Server organization using a public or private messaging network. Here are two possible scenarios:
Using Simple Mail Transfer Protocol (SMTP) hosts on the Internet to connect Exchange sites.
Using a public or private X.400 messaging system for connecting Exchange sites using the X.400 Connector.
Backboning. Connecting similar messaging systems by backboning over a different messaging system.
When using a public messaging backbone (or a private one owned by a different company) for connecting your Exchange sites, you should consider the following:
Installing and configuring appropriate messaging connectors on suitable messaging bridgehead servers
Establishing and maintaining directory replication between Exchange sites
Handling background traffic from other users of the backbone
Tuning messaging performance to optimize use of the backbone
Implementing a suitable topology for the messaging backbone
For very large Exchange organizations, use a hub and spoke topology instead of a mesh topology. Hub and spoke topologies have less redundancy and fault tolerance, but mesh topologies have routing tables that grow exponentially with the number of sites involved. Mesh topologies for large organizations can lead to routing tables that are so large they degrade the performance of the message transfer agents, even on high-performance servers.
Notes
The term backboning is sometimes used to describe the core messaging paths set up for a large Exchange organization, regardless of whether messaging systems other than Exchange are involved.
See Also Exchange Server
A context for running applications or services on a computer.
Overview
A program that runs in the background is unnoticed while the user performs another task on a different program in the foreground. For example, a spreadsheet that calculates data could be hidden and running in the background while the user types a letter using a word processor program running in the foreground. If the user switches from the letter to the spreadsheet, the roles of the two programs become reversed.
Operating systems usually assign fewer CPU resources to background programs than to foreground ones. In Microsoft Windows 2000, Windows XP, and Windows .NET Server, the System utility in Control Panel offers you several Performance options on the Advanced tab for optimizing performance between background and foreground tasks:
Applications: Provides more CPU resources to the foreground program and allocates short, variable quanta to running applications
Background Services: Divides CPU resources equally among the foreground program and any running background programs and allocates long, fixed-length quanta to applications
In addition, you can tune or enhance performance by modifying the total paging file size on all drives.
A suite of integrated server products from Microsoft Corporation.
Overview
The Microsoft BackOffice suite of server products is built upon the foundation of the Microsoft Windows 2000 Server and Advanced Server platform and provides a scalable, reliable solution for the needs of departments, branch offices, and medium-sized businesses. BackOffice is provided in an integrated package called BackOffice Server 2000, which provides tools for building directory, networking, messaging, Web services, database, proxy and firewall services, and Systems Network Architecture (SNA) host integration infrastructures.
BackOffice Server 2000 includes the following Microsoft server products:
Windows 2000 Server or Advanced Server with Service Pack 1
Exchange Server 2000
SQL Server 2000
Systems Management Server 2
Internet Security and Acceleration Server 2000
Host Integration Server 2000
In addition, BackOffice Server 2000 offers a host of additional tools for deploying and managing BackOffice components such as BackOffice Server management consoles, various wizards, reporting tools, and Microsoft FrontPage and Microsoft Outlook client software. For additional information on each of the server applications listed above, see their respective articles elsewhere in this book.
For More Information
Visit the BackOffice site at www.microsoft.com/backoffice.
See Also Small Business Server
A suite of integrated server products from Microsoft Corporation.
See Also BackOffice
A remote administration tool for Microsoft Windows developed by the hacker group Cult of the Dead Cow.
Overview
Back Orifice was first released for the Microsoft Windows NT platform in 1997 by Cult of the Dead Cow (CDC), a professed hacker group. Although the tool is basically a form of Trojan horse that can be used to gain control of a target machine, it is also a full-featured remote administration system for computers that run Windows NT and Windows 2000.
Back Orifice consists of two parts:
Server component: This is a small-footprint application that can be installed in a stealthy fashion on target systems and can also attach itself to any Windows executable on the target machine or run as a separate service using any name designed. The server runs invisibly in the background and is not visible to users logged on to the target machine even in the task list or close-program dialog box.
Client component: This application is used by the administrator (or hacker) to control the remote Windows 2000 computer. The client component can be used either in graphical user interface (GUI) or command-line mode and can be used to send commands to the server component to perform directory listings, copy or delete files, display or kill running processes, log all keystrokes entered at the remote machine's console, reboot or lock the system, edit the registry, and perform other actions. By default the client sends commands to the server through User Datagram Protocol (UDP) port 31337 but can be configured to use any available UDP port instead.
Back Orifice is a powerful remote administration tool, but because of its stealth features it is also a serious threat to systems running Windows NT and Windows 2000. Administrators who are concerned about this threat should consult article Q237280 in the Knowledge Base on Microsoft TechNet, which explains how to detect when the server component of Back Orifice is present on a system and how to remove it.
For More Information
You can find Back Orifice 2000 at www. cultdeadcow.comMicrosoft TechNet can be found at www.microsoft.com/technet.
See Also virus
The process of making reliable copies of important data so that the data can be recovered in the event of a disaster.
Overview
Performing regular backups is perhaps the system or network administrator's least glamorous but most important task. Data loss on a corporate network can occur for various reasons, including
Disk failures caused by hardware failure, power outages, or improper use
Network problems leading to lost packets that are not acknowledged because of router congestion or other situations
Virus infection, resulting in corrupted files
Sabotage by hackers or disgruntled employees, resulting in erased data
Theft of hardware from the premises
In each of these scenarios, having reliable backups of your company data is essential to recover from the disaster and continue normal business functioning.
Backup. Network and LAN-free backup scenarios in the enterprise.
At the enterprise level, backups can be performed using a variety of technologies, each of which have their own advantages. These technologies are a blend of backup device hardware and how these devices are implemented. The next section of this article looks at a few common scenarios. First, backup solutions can be characterized by the devices used to store the backed-up data. These devices can include
Tape drives: A tape drive is a device that stores data on magnetic tape. Many kinds of tape drives and tape formats are supported by different vendors, and these are discussed more fully in the articles "tape drive" and "tape format" elsewhere in this book. Generally speaking, however, tape drives have capacities in the tens of gigabytes range and are suitable for backing up data from individual servers or small groups of servers.
Tape libraries: A tape library consists of a set of tape drives, a large collection of tapes, and a robotic mechanism for loading and unloading tapes into drives. Tape libraries are common in large companies and can typically store several terabytes (one terabyte equals 1000 gigabytes) of data from groups of servers. For more information, see the article "tape library" elsewhere in this book.
Optical drives: Another medium for backing up data is optical drives, which range from simple CD-R/W drives to DVD-W drives and libraries containing many such drives. Optical drives are not as common as tape drives and libraries.
Storage appliances: These are generally rack-mountable black-box solutions in which the underlying operation is not important. Storage appliances are generally used for live data storage but can also be used for small-scale backup purposes.
Storage Area Networks (SANs): While SANs are primarily used for live storage of data, they can also be used for archiving backup data. See the article "storage area network (SAN)" elsewhere in this book for more information.
Besides these different backup devices, there are also various ways of implementing them for backing up data from network servers:
Server-based backups: In this scenario each server that holds valuable data has a tape drive directly attached to it, usually through a Small Computer System Interface (SCSI) connection. The disadvantage of this scenario is that it scales poorly for large companies-administrators would need to run around each morning to collect tapes from drives scattered all over the network.
Network backups: This is the most common scenario in most large companies. In a typical network backup scenario, a group of servers on a local area network (LAN) are connected using a second network interface card (NIC) in each server to a separate LAN dedicated for backup purposes. This dedicated backup LAN is concentrated using a Fast or Gigabit Ethernet Switch, which is also connected to a dedicated server called the backup server. The backup server has special software running on it that initiates and manages the job of backing up data on the production servers. The backup server itself is then connected by SCSI or FiberChannel to a tape library (see illustration).
LAN-free backup: This is a simplified form of network backup in which there's no second backup LAN. Instead, fiber channel cards are added to servers needing to be backed up and these are connected using fiber-optic cabling to a fiber-channel router, which then forwards the information directly over Fibre Channel links to tape libraries (see illustration). LAN-free backup is an emerging approach that is gaining in popularity due to its simplicity and high performance.
Serverless backups: This is a further refinement of LAN-free backups that takes the actual task of processing the backup from the servers and moves it to a Fibre Channel switch or router used to connect the servers to the tape libraries. This can provide significant relief to the servers since generating backups is a processor-intensive and memory-intensive job that limits other functions they can perform while the backup is occurring. Serverless backup solutions are just emerging in the marketplace.
Storage over IP: This technology backs up data from network servers directly to backup devices such as tape libraries and SANs using only an Ethernet network. No backup server is required to convert the data from Ethernet frames for transmission over SCSI or Fibre Channel connections to the backup device. Storage over IP is an emerging technology that promises to have a large impact on the backup market, and it is discussed further in the article "storage over IP" elsewhere in this book.
Internet backups: Backups can also be outsourced over the Internet to a Storage Service Provider (SSP) that is responsible for managing actual backup hardware and securely storing your data. For more information on this, see the article "televaulting" elsewhere in this book.
Finally, a third component of a backup system is the backup software itself. Some of the more popular backup software products used in the enterprise include
ArcServeIT from Computer Associates
Backup Exec and NetBackup from VERITAS Software Corporation
Legato NetWorker from Legato Systems
Storage Manager from Tivoli Systems
Backup Express from Syncsort
Hiback and Hibars from Hicomp Software Systems
Implementation
Instituting a regular backup plan is one of the main components of a company's disaster recovery policy (see the article "disaster recovery" elsewhere in this book for more information), and the importance of doing so cannot be stressed enough. To guard against these unexpected losses of data-or rather, to prepare for them, since they are, to a certain extent, inevitable-establish a disaster recovery policy that includes a reliable backup plan. In today's business world, where data is the lifeblood of the enterprise, a comprehensive plan is essential. The following steps are recommended when creating such a plan:
Decide what kind of backup storage devices to use. Options range from small digital audio tape (DAT) drive units capable of backing up several gigabytes of data to large automated tape libraries capable of handling terabytes of centralized data storage. Other backup options include optical storage libraries and removable disks such as Iomega's Zip drive disks or Imation SuperDisk disks.
Decide whether to back up servers with dedicated, locally connected storage devices or over the network to centralized backup libraries. Network backup systems suffer from a single point of failure (the network itself) but are simpler to administer than a multitude of individual backup units.
Decide whether individual users' workstations should also be backed up. A more cost-effective option is to educate users to always save their work on a network share located on a server that is regularly backed up.
Decide how to secure the storage of backup tapes and other media. Will duplicate copies be stored both on-site (for easy access if a restore is needed) and off-site (in case the company's building burns down)? Make sure the storage facilities are climate-controlled and secure.
Decide what kind of backup strategy to employ. A backup strategy is a combination of a backup schedule and various backup types, including normal, copy, incremental, differential, and daily copy backup types. Also consider whether you will verify all tapes immediately after each backup is performed. For further information, see the articles "backup strategy" and "backup type" elsewhere in this chapter.
Assign various aspects of the backup procedure to the responsible party. One option some companies now use is to back up data over the Internet to a third-party backup service provider that stores and maintains the backed-up data. This method involves issues of trust and of the Internet connection as a point of failure.
Test backups periodically to ensure that they are actually readable. Nothing is worse than thinking you have a backup when in fact it is unreadable.
Notes
To enable administrators to perform regular backups, Microsoft Corporation includes backup utilities with all versions of Microsoft Windows, such as the Backup tool in Windows XP.
See Also backup strategy ,backup type storage over IP, storage service provider (SSP), tape drive, tape format, tape library
A service that can be installed on a computer to allow files and folders stored on the computer to be backed up remotely over the network.
Overview
Backup agents enable backups to be performed across an entire network from a centralized location. In networks that utilize this type of storage retention architecture, where a backup agent is installed on each server, files are backed up over the network to a central storage location, which in enterprise environments is usually a tape library or some type of Network Attached Storage (NAS). This approach to backups makes it easier to manage enterprise storage requirements even for large scale corporate networks and Internet service providers (ISPs).
Backup agents are specific to the type of backup software being used and are usually supplied with that software when you purchase it from a vendor. Once an agent is installed on a computer, you can back it up over the network as easily as if a tape drive were connected directly to the computer.
See Also backup
A Windows 2000, Windows XP, and Windows .NET Server computer that participates in the Computer Browser service.
Overview
A backup browser is a computer that obtains a copy of the browse list from the master browser. The browse list contains information about which shared resources are available to client machines on the network and about which domains are on the network. Backup browsers automatically contact the master browser every 12 minutes to request a copy of the browse list. If the contact is successful, the master browser issues the list to the backup browser. If the backup browser cannot contact the master browser, it starts a browser election to force a new master browser to be selected.
Once the backup browser has obtained the browse list, it caches the list and distributes it to any client that requests it. To request the browse list from a backup browser, a client calls the NetServerEnum application programming interface (API) on the backup browser.
Backup browser. How a client obtains the browse list from a backup browser.
Notes
There will be one backup browser for every 32 systems in a given domain or workgroup on the network. The Computer Browser service determines the number of backup browsers necessary to ensure that clients can have efficient access to network resources.
See Also Computer Browser service ,domain master browser ,master browser
A representation of the results of performing a backup of servers on a network.
Overview
Backup software, such as the Backup tool in Microsoft Windows 2000, Windows XP, and Windows .NET Server, creates catalogs so that the location and properties of backed-up files are documented and can be found easily when a restore needs to be performed. Windows 2000, Windows XP, and Windows .NET Server Backup stores its catalogs on the backup storage media themselves. These catalogs are then loaded into memory when the program is run. Catalogs can also be saved to disk and printed for documentation purposes.
Windows 2000, Windows XP, and Windows .NET Server Backup creates two different types of backup catalogs:
Tape catalog: Lists the details of all backup sets that have been stored on the tape. If a backup operation spans several tapes, the tape catalog is located on the last tape of the series, because it is created at the end of the backup operation.
Backup set catalog: Lists the details of files and folders included in a specific backup set. A backup set catalog is saved at the end of each backup set on the tape. This catalog is used by the Windows 2000, Windows XP, and Windows .NET Server Backup program to store a summary of the file and directory information for the backup set, the number of tapes in the backup set, and the date on which the backup was performed.
See Also backup set
A Microsoft Windows NT domain controller containing a read-only copy of the Security Accounts Manager (SAM) database.
Overview
On the Windows NT platform, the only writable copy of the SAM database is located on the primary domain controller (PDC). In addition to this PDC, a Windows NT domain can have zero or more backup domain controllers (BDCs) as well. These BDCs are used to provide load balancing and redundancy for network authentication. These BDCs periodically undergo directory synchronization with the PDC by retrieving a copy of the directory database from the PDC.
Backup domain controller (BDC). Different ways to deploy a BDC over a WAN link.
Every Windows NT network should have at least one BDC for fault tolerance. If the PDC fails, the BDC can be promoted to take its place. One BDC can support approximately 2000 users on a network, but many factors can affect this figure.
Note that a BDC can perform logon validation and authentication as a PDC can, but it cannot manage accounts-for example, it cannot change user passwords.
Implementation
The placement of BDCs in wide area networks (WANs) that are based on Windows NT is an important issue. In a master domain model scenario, user accounts are centralized in a master domain located at company headquarters, but users and shared network resources are distributed in resource domains located at branch offices in different locations. The users in this scenario must log on to the master domain in order to access resources in the enterprise. There are two ways of facilitating this:
Locate all BDCs belonging to the master domain at headquarters. Unfortunately, when users at the branch offices want to log on, they will have to use the relatively slow WAN link to do so. The additional logon traffic can cause congestion on the WAN link, particularly at certain times of the day.
Locate one or more BDCs belonging to the master domain at each branch office (resource domain). This will facilitate logons by users located at branch offices, since they can log on to one of these BDCs locally instead of being validated over the relatively slow WAN link by a domain controller at headquarters. However, directory replication traffic between the BDCs located at the branch offices and the PDC at headquarters can cause congestion over the WAN links. To make directory synchronization more efficient over the WAN link, registry parameters such as ReplicationGovernor and ChangeLogSize can be adjusted and batch files can be scheduled using the at command to configure different replication rates at different times of the day.
See Also domain controller ,primary domain controller (PDC)
In Microsoft Windows 2000, Windows XP, and Windows .NET Server, a user who is assigned the responsibility of backing up and restoring servers on a network.
Overview
To make an individual a Backup Operator, simply make him a member of the Backup Operators group. Backup Operators can exist on Windows NT domain controllers, on member servers, and on workstations. In Windows 2000, Windows XP, and Windows .NET Server, Backup Operators are members who have a similar function and belong to the built-in group called the Backup Operators built-in group.
Backup Operators have the preassigned right to log on locally to a computer and to back up and restore files and directories on the system. Backup Operators also have the right to shut down the system. Backup Operators do not need permissions assigned to them in order to back up a particular file or directory-they have a broad system right to do so.
Notes
Backup Operators should be assigned only in enterprise-level networking environments. In small to medium-sized networking environments, backing up and restoring servers is usually the responsibility of the administrator.
See Also Backup Operators built-in group ,built-in group
In Microsoft Windows 2000, Windows XP, and Windows .NET Server, a built-in group for containing users who need privileges to back up servers on the network.
Overview
Backup Operators is a built-in group existing on all Windows 2000-, Windows XP-, and Windows .NET Server-based servers and workstations. The Backup Operators built-in group is a local group with the following preassigned rights:
Log on locally
Back up files and directories
Restore files and directories
Shut down the system
Notes
If you want a user to be able to back up files and directories on any domain controller in a domain, place the user in the Backup Operators group on any domain controller. Since all domain controllers share the same directory database, the user will be a member of the Backup Operators built-in group for all domain controllers. However, if you want a user to be able to back up a member server, place the user in the Backup Operators built-in group that is a local group on that particular member server.
See Also built-in group
A collection of files and folders on a backup media that were saved in a single Microsoft Windows 2000, Windows XP, and Windows .NET Server Backup operation.
Overview
There are several options for creating backup sets in Windows 2000, Windows XP, and Windows .NET Server:
Multiple backup sets can be saved on a single backup tape by appending each new set to the last one.
A backup set can span multiple tapes if you have a large quantity of information to back up.
Tapes can be overwritten so that a new backup set replaces the old one.
Backup set. A representation of a backup set.
Windows 2000, Windows XP, and Windows .NET Server Backup creates a backup set catalog for each backup set. This catalog lists the various files and directories that have been backed up, and you can use it for restoring individual files or directories or print it for documentation purposes. The backup set catalog is saved at the end of each backup set on the tape. A backup set map at the end of the tape locates all backup sets on the tape.
Notes
A copy of the local system's registry can also be included in the backup set for a Windows 2000, Windows XP, and Windows .NET Server system. Backup sets are described with friendly names that can be up to 32 characters long.
See Also backup catalog
A plan for performing backups to ensure against data loss.
Overview
Successful backup strategies take the following issues into account:
The various backup types that can be performed
The need to archive tapes for long-term data security
The time needed to perform backups and restores
The cost of tapes
The cost of losing data
There's no one right way to implement a backup strategy for resources on a network of computers. To select the best backup strategy for your network, you must consider each of the items in the preceding list and balance them against one another. Your strategy should be simple, efficient, and reliable. The following table shows some examples of backup strategies:
Backup Strategy | Advantages | Disadvantages |
Normal backups Monday through Friday. | Most secure-every tape contains all backed up files | Longest time to back up |
Normal backup Monday; differential backups Tuesday through Friday. | Less time to restore | More time to back up |
Normal backup Monday; incremental backups Tuesday through Friday. | Less time to back up | More time to restore |
Use a separate tape for each weekday and archive Monday's full backup tape weekly or monthly. | Less chance of data loss | Higher cost, since more tapes are needed |
Use the same tape for each weekday and archive the tape each week or month. | Cheaper- only one tape required per week or month | Greater chance of data loss, since using only one tape |
See Also backup ,backup type
A particular method for performing a backup of files and directories.
Overview
Each type of backup has a different function in an overall backup plan. Most network backup software (such as Microsoft Windows 2000, Windows XP, and Windows .NET Server Backup) supports five backup methods:
Normal backup: Backs up volumes, folders, and files that have been specified by the administrator. Normal backups are the fastest and easiest to restore. Normal backups are sometimes referred to as "full backups." Use a normal backup when you want to ensure that all your critical system and data files are backed up in a single operation. If your backup cycle consists only of normal backups and you need to perform a restore, you need to use only the most recent normal backup to do so.
Copy backup: Primarily used to produce an additional copy of a backup-for example, a copy to send to the accounting department for monthly archiving and reporting. While a copy backup backs up the same files as a normal backup, there is a difference between the two operations. Performing a normal backup clears the archive bit on each backed-up file and marks them as having been backed up. A copy backup, however, does not modify the archive bit on the files backed up. In other words, you can perform a copy backup at any time in a backup cycle without interrupting the cycle in any way-the copy backup is distinct from the backup cycle and is not required when a restore is performed from the cycle's set of tapes.
Incremental backup: Backs up only files that have been created or modified since the last normal or incremental backup. Files that are backed up in an incremental backup have their archive attributes cleared in order to indicate that they have been backed up. Using a combination of normal and incremental backups takes less time and uses less storage space than performing only normal backups. However, if you need to perform a restore, you typically need to use the normal backup plus every incremental backup from the current backup cycle to do so.
Differential backup: Copies those files that have been created or changed since the last normal or incremental backup. Files that are backed up by a differential backup do not have their archive attributes cleared, which means that these files will be backed up again in any succeeding differential backups. Differential backups are cumulative with regard to changes-that is, each differential backup in a given backup cycle contains all the files from the last differential backup, plus any files that have been modified since the last differential backup. Thus, if you need to perform a restore, you will typically need to use only the normal backup and the most recent differential backup from the current backup cycle to do so.
Daily copy backup: Copies all files that have been modified on the day the daily copy backup is performed. This method is sometimes used to make a copy of all files a user worked on in a day so that he or she can take them home to work on. Like a copy backup, the daily copy backup does not modify the archive bit of the files backed up; therefore, the daily copy backup does not interrupt the backup cycle in any way.
Notes
Different types of backup operations have different effects on the archive attributes of the files and directories they back up. A backup operation marks the archive attribute by clearing it to indicate that the file has been backed up. If the file is later modified in some way, its archive attribute is set (unmarked). The following table shows what each type of backup operation does to the archive attribute.
Backup Type | Archive Attribute |
Normal | Cleared |
Copy | No effect |
Incremental | Cleared |
Differential | No effect |
Daily copy | No effect |
See Also backup ,backup strategy
A wizard that is part of the Microsoft Windows 2000, Windows XP, and Windows .NET Server Backup tool.
Overview
You can use the Backup Wizard to configure, schedule, and execute a backup. The Backup Wizard starts by letting you choose among the following:
Backing up all files on the computer on which it is running.
Backing up files and folders that you specify. These files and folders can be either on the local computer or on any shared location on the network.
Backing up Active Directory directory service information and the registry on the computer on which the wizard is running. Active Directory can be backed up only on a domain controller.
The wizard then leads you through the process of specifying a backup location and other advanced backup options, such as verification, compression, and remote storage. You can also schedule a backup job to run unattended at a later time when users have stopped working and all files are closed.
See Also backup
Stands for Bandwidth Allocation Control Protocol, an enhanced version of Bandwidth Allocation Protocol (BAP), a protocol that manages bandwidth for Multilink Point-to-Point Protocol (MPPP) connections.
See Also Bandwidth Allocation Control Protocol (BACP)
An electrical cable consisting of pairs of conductors that have identical electrical characteristics with respect to each other and with respect to ground.
Overview
In a balanced line, both of the two wires are carrying current at any given instant. However, at any particular moment, the directions of the current in the wires are opposite each other. This condition is also described by saying that the currents in the wires are 180 degrees out of phase with each other at any given moment.
Both wires have voltages that are above ground potential, but the potentials of the wires are different with respect to ground, resulting in a flow of current. The wire pair is twisted in order to ensure that the electromagnetic radiation produced by both wires is effectively canceled out, reducing the overall electromagnetic interference (EMI) produced by the wires and reducing their sensitivity to induced currents from external sources of EMI.
The most common example in computer networking is the twisted-pair cabling used in 10BaseT Ethernet networks.
Notes
A balun can be used to connect a balanced line to an unbalanced line.
See Also balun ,unbalanced line
Stands for balanced unbalanced, a device used to connect balanced lines and unbalanced lines.
Overview
Balanced and unbalanced lines have different electrical characteristics that prevent them from simply being connected to each other. A balun matches these different characteristics by providing impedance transformation between the two different lines.
Balun. An example of a coxial-to-twisted-pair balun.
Baluns can be used for various types of connections between different wiring systems:
Twisted-pair cabling to coaxial cabling: Typically used for connecting 10BaseT networks with 3270 equipment running on coax or twinax networks
Twisted-pair cabling to Token Ring cabling: Used for matching Token Ring Type 1 cabling to standard unshielded twisted-pair (UTP) cabling to connect 10BaseT or faster hubs or adapters with RJ-45 ports into a Token Ring network
Asynchronous Transfer Mode (ATM) cabling to Token Ring cabling: Used for connecting Token Ring networks to high-speed ATM hubs in campus backbone networks
See Also balanced line ,unbalanced line
The information-carrying capacity of a signal or technology.
Overview
By definition, bandwidth equals the difference between the highest and lowest frequencies in a given range of frequencies. For example, if the lowest and highest frequencies a telephone line can carry are 300 hertz (Hz) and 3300 Hz, the bandwidth of the telephone line is 3300 - 300 = 3000 Hz, or 3 kilohertz (kHz).
The above definition of bandwidth applies to any signaling system, analog or digital. With digital systems such as computer data networks, the term bandwidth is often used to describe the capacity of a communication channel for carrying signals. The greater the bandwidth, the more data can be transferred in a given time. Since bandwidth is here synonymous with information, and digital information is conveyed in bits (1=on and 0=off), bandwidth for such systems is usually expressed in bits per second (bps) or some multiple thereof (including Kbps, Mbps, Gbps, and Tbps). This rate of flow of information in bits per second is more properly termed "throughput," but bandwidth is the usual expression used in popular literature.
Shannon's Law can be used to determine the information-carrying capacity of a transmission channel as follows:
(Throughput in bps) = (Bandwidth in Hz) x log2 [1 + R]
where
R = (Signal power in Watts) / (Noise power in Watts)
This formula is only approximate since it does not take into account the medium's transmission properties and other considerations. The significant thing to notice, however, is that as noise (due to crosstalk, interference, or some other source) increases, the channel's capacity to carry information decreases.
For fiber-optic cabling, the bandwidth is usually expressed in units of MHz-km. For example, a cable rated at 500 MHz-km could carry 500 Mbps of data a distance of 1 kilometer (km), 250 Mbps of data a distance of 2 kilometers, 100 Mbps of data a distance of 5 kilometers, and so on. A similar explanation holds for measurements in units of MHz-miles.
Notes
Adequate bandwidth is a prerequisite for reliable communications, and ensuring sufficient bandwidth in today's Internet economy often drives upgrades for enterprise networks. When a new bandwidth need arises, such as deployment of streaming media across a network, the obvious solution may seem to be to "throw bandwidth at the problem," that is, to spend money on upgrading the network infrastructure from Ethernet to Fast Ethernet to Gigabit Ethernet (GbE) and beyond. This is really only one solution-another, sometimes better, approach is to implement Quality of Service (QoS) mechanisms to prioritize traffic so that certain forms of traffic receive preferential transport over less important forms. QoS is an elegant solution that sidesteps the brute-force approach of simply adding more bandwidth, but QoS can be difficult to configure and manage. Although Asynchronous Transport Mode (ATM) networks have the advantage of having QoS built into their operational fabric, the far more common Ethernet networks require new protocols such as DiffServ and Resource Reservation Setup Protocol (RSVP) to be implemented to support even rudimentary QoS features. And with the rapidly dropping prices of GbE switching gear and the appearance of 10 GbE on the horizon, simply adding more bandwidth when it is needed is still the most common solution for most large companies.
See Also quality of service (QoS) ,signaling
An enhanced version of Bandwidth Allocation Protocol (BAP), a protocol that manages bandwidth for Multilink Point-to-Point Protocol (MPPP) connections.
Overview
Although BAP dynamically controls how bandwidth can be allocated for Multilink Point-to-Point Protocol (MPPP) connections, a condition can sometimes occur in which both hosts at the two ends of a MPPP connection try to add or remove an additional link at the same time. The Bandwidth Allocation Control Protocol (BACP) is an enhanced version of BAP that is designed to handle such a scenario. It does this by establishing ahead of time which MPPP host is the favored peer, that is, the one whose BAP request will be honored in case of a collision of two requests.
See Also Bandwidth Allocation Protocol (BAP) ,Multilink Point-to-Point Protocol (MPPP)
An offshoot of Multilink Point-to-Point Protocol (MPPP) that allows new links to be added or removed dynamically when needed.
Overview
The Bandwidth Allocation Protocol (BAP) dynamically controls how bandwidth can be allocated for multilink connections using the Point-to-Point Protocol (PPP). BAP makes multilink remote access (RAS) connections more efficient by allocating lines only as required, thus eliminating wasted bandwidth. This can be especially useful if the telecommunications carrier provisioning the PPP connection charges by the amount of bandwidth being utilized by the customer.
BAP allows the administrator to configure the PPP server to specify which particular MPPP lines can be added or dropped. The administrator also specifies which bandwidth thresholds must be crossed before additional lines are added or existing ones are dropped. BAP is especially useful over Integrated Services Digital Network (ISDN) connections, because these dial-up services can almost instantly add or drop lines.
Notes
BAP is included in Microsoft Windows 2000 and Windows .NET Server as an enhancement to the Routing and Remote Access Service (RRAS) of Windows NT 4. BAP is outlined in detail in RFC 2125.
See Also Bandwidth Allocation Protocol (BAP) ,Multilink Point-to-Point Protocol (MPPP)
Any networking or telecommunications technology that provides both a permanent, dedicated connection and the capability of quickly increasing bandwidth when needed by users.
Overview
Many telecommunications devices incorporate bandwidth-on-demand features of various types. For example, some Integrated Services Digital Network (ISDN) devices used for Basic Rate Interface ISDN (BRI-ISDN) can be configured to use the second ISDN B channel only when the utilization of the first channel exceeds a certain threshold. If this threshold is exceeded for a specified period of time, the second B channel automatically opens up to facilitate and speed data transfer. Once the data rate has dropped below the threshold, the second B channel shuts down until it is needed again. The ISDN technology for accomplishing this combining of channels is called bonding. Many Asynchronous Transfer Mode (ATM) products also support various bandwidth-on-demand features.
Bandwidth-on-demand technologies are typically used in bursty networking situations in which high transmission speeds and capacities are required for transporting video, voice, and data on common networking circuits. Bandwidth-on-demand configurations often involve a mix of leased-line services and circuit-switched telecommunications services, and they can save users money by opening additional circuits only on an as-needed basis. Networks that make use of bandwidth on demand can be designed to supply additional bandwidth under conditions such as
Exceeding a specified threshold of network traffic
Scheduling for expected peak periods of the day
Failover in case the permanent link goes down
See Also Asynchronous Transfer Mode (ATM), bandwidth, Integrated Services Digital Network (ISDN)
Generally, any networking technology that controls the amount of network bandwidth used by servers, applications, or network communication paths.
Overview
In the context of Microsoft Internet Information Services (IIS), for example, bandwidth throttling is a technique for controlling the amount of network bandwidth used by individual Web sites hosted on the server. You can use bandwidth throttling to prevent hits on a popular site from overwhelming the server and preventing other sites hosted on the server from being accessed by clients.
For example, if five Web sites are being hosted on a single machine running IIS but one of them is extremely popular, the other sites might get starved for bandwidth and users might have difficulty connecting to them. In order to rectify this situation, a specific maximum bandwidth level can be allocated to the popular site with the Internet Services Manager snap-in used for administering IIS using the Microsoft Management Console (MMC). If this maximum bandwidth is exceeded, no further connections to that site are allowed until the bandwidth utilization level drops below the threshold. This allows the unallocated bandwidth to be shared among the remaining less popular sites so that users can connect to them.
See Also bandwidth ,Internet Information Services (IIS)
Stands for Banyan Virtual Integrated Network Service (VINES), a legacy network operating system (NOS) for building enterprise-level networks.
Overview
VINES was originally based on a proprietary family of protocols that was derived from the Xerox Network Systems (XNS) protocol. VINES uses a client/server distributed networking architecture for allowing clients to access network resources on servers over the network. VINES includes such features as
Basic file and print sharing
A distributed directory service called StreetTalk for managing networks
Support for the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol
Graphical administration tools
Support for Simple Network Management Protocol (SNMP) management
VINES includes clients for MS-DOS, OS/2, Microsoft Windows, and Macintosh platforms as well as optional applications for integrating Windows NT, AppleTalk, Novell, and UNIX networks into existing VINES-based networks.
VINES is built on a client/server model in which clients can make requests for services from servers on the network. The VINES protocol stack consists of five basic layers that map to the seven-layer Open Systems Interconnection (OSI) reference model as follows:
Physical and data-link layers: VINES can operate over Ethernet, Token Ring, X.25, and other types of networking architectures.
Network layer: The main protocol here is the VINES Internetwork Protocol (VIP), which is similar in function to the IP of the TCP/IP protocol suite. VIP encapsulates data and addresses it using a 48-bit address that contains a 32-bit network number and a 16-bit host number. Dynamic address assignment and address resolution are performed using VINES servers, which are referred to as service nodes. VINES clients obtain their addresses dynamically from the nearest server on the network. Multihomed servers function as routers, and routing tables are maintained by periodic announcements from clients and servers. Other network layer protocols include an Address Resolution Protocol (ARP), an Internet Control Protocol (ICP), and a Routing Table Protocol (RTP).
Transport layer: For reliable delivery of data using acknowledgments and sequence numbers, VINES uses its Reliable Message Service. Another service, the Unreliable Datagram Service, supports only best-effort delivery of packets. Finally the Data Stream Service can be used to transmit large amounts of data using virtual circuits with flow-control mechanisms.
Session and presentation layers: VINES implements the standard remote procedure call (RPC) mechanism for enabling communication between VINES client and server components on different stations on the network.
Application layer: VINES supports standard file and print services, directory services (StreetTalk), and a number of other application layer services and protocols.
Notes
When connecting Windows 95 or Windows 98 clients to a VINES-based network, use the 32-bit client for Windows that comes with VINES instead of the 16-bit VINES client included with Windows 95 and Windows 98.
For More Information
Visit the Banyan home page at www.banyan.com
Stands for Bandwidth Allocation Protocol, an offshoot of Multilink Point to Point Protocol (MPPP) that allows new links to be added or removed dynamically when needed.
See Also Bandwidth Allocation Protocol (BAP)
A signaling technology that sends digital signals over a single frequency as discrete electrical pulses.
Overview
The entire bandwidth of a baseband system carries only one data signal and is generally less than the amount of bandwidth available on a broadband transmission system. The baseband signal is bidirectional so that a baseband system can transmit and receive signals simultaneously.
Baseband signals can be regenerated using repeaters in order to travel longer distances before weakening and becoming unusable because of attenuation. Baseband transmission technologies do not use modulation but often use time-division multiplexing (TDM) to accommodate multiple channels over a single baseband transmission line.
Common local area network (LAN) networking technologies such as Ethernet use baseband transmission technology. All stations on a baseband network share the same transmission medium, and they use the entire bandwidth of that medium for transmission. As a result, only one device on a baseband network can transmit at a given instant, resulting in the need for a media access control method to handle contention.
See Also broadband transmission ,Ethernet
A set of data that indicates normal usage of monitored network resources.
Overview
You can use the Microsoft Windows 2000, Windows XP, or Windows .NET Server Performance console to collect data for the present performance of your network to establish a baseline. Then, if you upgrade hardware or add new users, you can measure the network's performance again and compared it with the baseline to determine trends, identify bottlenecks, and measure capacity.
Creating a baseline for server and network activity begins with the process of identifying which server and network resources should be systematically measured. Generally, you always want to measure at least the following four resources: memory, processor, disk, and network subsystems. Using the Performance console, you should collect data for the objects shown in the following table.
Resource | Objects to Collect |
Memory | Memory, cache |
Processor | Processor, system, server work queues |
Disk | Logical disk, physical disk |
Network | Server, network interface, network segment |
These performance objects should be regularly captured for a period of time in order to collect the data needed to establish the baseline. Generally, you should append each log file collected to a master log file using relogging. Focus on periods of peak server and network activity and collect at least a week of measurements to establish your baseline.
Notes
If you want to collect disk subsystem data, first enable disk objects using the Diskperf command. Make sure you use a computer that is not being monitored to create your measurement baseline log files so that the activity of the computer doing the monitoring will not affect the data being collected.
Also called cleartext or plaintext authentication, an authentication scheme that passes a user's credentials over a network in unencrypted form.
Overview
Basic authentication is defined as part of the Hypertext Transfer Protocol (HTTP) version 1 specification in RFC2617. It is not a secure authentication scheme, since anyone who can intercept network traffic and read it using a protocol analyzer can obtain the user's credentials. Although it is sometimes called cleartext authentication, Basic authentication actually encodes a user's credentials using a well-known public encoding algorithm known as Uuencoding or Base64. Because the algorithm for this encoding method is so well known, however, it is easy to decode encoded text and extract a user's credentials from a Basic authentication session.
Implementation
Basic authentication is one of several authentication schemes available on Microsoft Internet Information Services (IIS) for the Microsoft Windows 2000, Windows XP, and Windows .NET Server platforms. When a user tries to access content on a Web site hosted on IIS and the site implements Basic authentication, a dialog box appears on the user's browser asking for the user's credentials (username and password). The credentials are passed to IIS in the headers of the HTTP GET request, and are compared either to credentials in Active Directory directory service (if implemented) or to the Security Accounts Manager (SAM) database (on a workgroup server). If Active Directory is used, the user's User Principal Name (UPN) can be utilized for authentication purposes. Users who need to be able to access IIS using Basic authentication require the Log On Locally system right (although this can be changed using Active Directory Services Interface, abbreviated ADSI).
The problem with employing Basic authentication is that it is inherently insecure because of the cleartext transmission of the user's password. However, IIS does allow Basic authentication to be implemented with Secure Sockets Layer (SSL) encryption, in which case an encrypted session is first established for the user after which the user's credentials are passed to IIS in encrypted form.
The plus side of Basic authentication is that it can be performed through a firewall or proxy server (Integrated Windows authentication or Windows NTLM cannot work in this case).
Notes
Basic authentication is often used in a UNIX environment for authenticating remote HTTP users.
If you employ Basic authentication with IIS, make sure you also use the NTFS file system (NTFS) to secure access to files on your system.
See Also authentication protocol
In Microsoft Windows 2000, Windows XP, and Windows .NET Server, a physical disk that can contain primary partitions, extended partitions, and logical drives.
Overview
Basic disks can be accessed by MS-DOS and legacy Windows platforms and are backward-compatible with these platforms for multiboot systems. Basic disks can also contain volumes created using Windows NT version 4 or earlier, such as spanned volumes (volume sets), striped volumes (stripe sets), mirrored volumes (mirror sets), and RAID 5 volumes (stripe sets with parity).
Basic disks are the default type of disk in Windows 2000 and Windows XP. All disks are basic disks unless you convert them to dynamic disks. Basic disks can have two kinds of partitions:
Primary partitions: Basic disks support up to four primary partitions, only one of which can be marked as active.
Extended partitions: Basic disks support only one extended partition, which can be further subdivided into logical drives or logical volumes.
Notes
You can create only basic volumes on basic disks. You cannot create new simple, spanned, striped, mirrored, or RAID 5 volumes on basic disks.
See Also basic volume ,dynamic disk
The slower version of Integrated Services Digital Network (ISDN) communications (the faster being Primary Rate Interface ISDN, abbreviated as PRI-ISDN).
Overview
Basic Rate Interface ISDN (BRI-ISDN, or simply BRI) communications links consist of two B channels and one D channel. The B channels carry the voice or data between the customer premises and the telco central office (CO), and the D channel (control channel) is used for establishing connections and signaling various conditions. BRI is often referred to as 2B+D because of the channels that it employs.
Since the bandwidth of each B channel is 64 kilobits per second (Kbps), the total bandwidth of BRI is twice that, or 128 Kbps. This bandwidth can be used as two separate communication links of 64 Kbps each (for example one for voice and the other for data), or it can be combined into a single 128-Kbps communication link using a technique called bonding. The bandwidth of the D channel is 16 Kbps.
Implementation
BRI connections at customer premises can be connected directly to a switch at the CO, an ISDN call controller that is linked to the CO, an ISDN Private Branch Exchange (PBX), or some other signaling and communication equipment.
If you plan to order a router or access server that supports BRI, make sure you find out from your telco of what kind of ISDN interface is used at your customer premises. The two most common interfaces are the U interface and the S/T interface, and they physically appear the same. Many ISDN access devices support both kinds of interfaces, but check to make sure first.
See Also bonding ,Integrated Services Digital Network (ISDN) ,Primary Rate Interface ISDN (PRI-ISDN)
A type of volume in Microsoft Windows 2000, Windows XP, and Windows .NET Server that is compatible with earlier Windows operating systems.
Overview
A basic volume can be created only on a basic disk and can be
A primary partition, extended partition, or logical drive that was created using the Disk Management portion of the Computer Management tool
A volume set, mirror set, stripe set, or stripe set with parity that was created using Windows NT version 4 or earlier
See Also basic disk ,dynamic volume
A network server that is hardened against attack from the outside world.
Overview
Bastion hosts are servers exposed to the outside world and fortified to protect them from attack by hackers. Bastion hosts usually reside on the edge of your corporate network where it connects to the Internet, and often within a specific area called the perimeter network, also known as the DMZ (demilitarized zone), which forms a kind of transition network between your corporate network and the public Internet.
There are many different kinds of bastion hosts:
Sacrificial hosts: These are hosts whose security being compromised is not an issue of great importance. Examples might be a public Web server exposed only to the Internet and not to the corporate side of the perimeter network, or a test server running new applications whose security configuration is still under development, or a dummy host to distract attackers away from the real prize.
External service hosts: These are servers that are primarily exposed to the Internet and may include mail servers, Web servers, and news servers. These hosts are sometimes called primary bastion hosts.
Internal service hosts: These are servers that are primarily exposed to the corporate network and may include name servers and logon servers. These hosts are sometimes called secondary bastion hosts.
Nonrouting multihomed hosts: These are servers connected to both the internal and external networks but are configured to prevent routing between the two networks. It is essential to verify with this type of host that routing is in fact disabled.
Managing a bastion host involves several activities:
The initial configuration of the host is important and usually involves removing unnecessary applications, disabling unnecessary services, and removing unnecessary user accounts from the host. In this sense, a bastion host can be thought of as a stripped-down server with limited but highly specific functionality. The motto "keep it simple" is a good rule of thumb when configuring a bastion host-the simpler the server's configuration, the easier it is to monitor and troubleshoot.
The implementation of a firewall is an essential step in securing a bastion host. The firewall may reside on the host itself or on some other server within the perimeter network, or it may be a multistage firewall residing on several hosts.
Monitoring the bastion host once it is configured is essential to determine whether it has been attacked and whether any damage has occurred that might compromise the network. Network security is not a one-time affair but an ongoing commitment that involves auditing, performance monitoring, traffic capture and analysis, logging, and reporting.
Finally, it is essential to accept the fact that bastion hosts are likely to be compromised as new operating system and application bugs are reported and fixes issued by vendors. As a result, never put anything on a bastion host that you would mind losing or which is not available somewhere else. Accept the worst-your host will be compromised someday.
Notes
Some additional tips on deploying bastion hosts:
Use older, slower machines for bastion hosts if possible because they are less attractive targets for attack by hackers, and, if compromised, are less useful for executing code that can be used to attack the internal network.
Use the operating system platform you are most familiar with for your bastion hosts, as you need an intimate knowledge of the platform's services to be able to harden them against attack.
Place bastion hosts on a separate network from the internal corporate one, usually the DMZ or some other perimeter network.
Make sure you physically secure the bastion hosts as well-hardening a host and then leaving it an unlocked basement room does not make sense.
Remove all user accounts from bastion hosts except a dedicated administrator account that is protected by a strong password. Use a machine-specific administrator account rather than a domain administrator account if possible.
Keep abreast of all releases of service packs and patches for the operating system deployed on your bastion host and apply these when required.
See Also firewall ,network security
A special set of commands generally found only in batch files.
Overview
Although batch files can essentially contain any commands that can be executed at the command line, a special set of batch commands enable special actions to be performed such as jumps, terminal echoing, and conditional processing.
The table on the following page lists special batch commands that are found only in batch files. These commands are all supported by Microsoft Windows 2000, Windows XP, and Windows .NET Server, but earlier versions of Windows might support only a subset of them.
Command | Description |
Call | Calls one batch program from another while allowing the calling program to continue running |
Echo | Toggles command-echoing on or off |
Endlocal | Restores environment variables set by a Setlocal command |
For | Used to run a specified command for each file in a set of files |
Goto | Jumps to a specific line that is labeled in a batch file |
If | Used to perform conditional processing of commands |
Pause | Suspends processing of the batch file and waits for the user to respond |
Rem | Used to insert remarks (comments) in a batch file for documentation purposes |
Setlocal | Initiates localization of environment variables in a batch file |
Shift | Used to change the position of replaceable parameters in a batch file |
See Also batch file ,Windows commands
Also called a batch program, an ASCII file containing a series of commands.
Overview
The commands within a batch file are executed sequentially when the file is invoked. Generally, any command that can be entered at the command line can be used within a batch file as well. You can execute batch files either at the command prompt, by associating a shortcut with them and double-clicking on the shortcut, or by invoking them in a logon script or through some other script or program.
Batch files are traditionally identified using the extension .bat or .cmd. Batch files trace their origins back to MS-DOS, with the Autoexec.bat file being the best- known example. While batch files are still used by many administrators for logon scripts, the advent of the Windows Script Host (WSH) in Microsoft Windows 98, Windows NT Option Pack, Windows 2000, Windows XP, and Windows .NET Server allows more powerful administrative scripts to now be written using higher- level scripting languages such as Microsoft Visual Basic Scripting Edition (VBScript) and JavaScript. As a consequence of the WSH, the old paradigm of batch files may finally be about to disappear.
Examples
Batch files are used primarily to simplify the execution of routine or repetitive administrative tasks such as mapping drives, synchronizing system clocks, or performing backups. For example, on a Windows NT-based network, to control the rate at which directory information is replicated between a backup domain controller (BDC) and a primary domain controller (PDC), you can create a batch file that will change the value of the ReplicationGovernor parameter on the BDC. To do this, first create a script that has the full path to this parameter in the registry along with the value you want to assign to it and then create the following simple batch file:
regini <Script_Name> net stop netlogon net start netlogon
Two different scripts and batch files can be created for different times of the day, and the At command can be used to schedule the execution of each batch file at the appropriate time. This illustration is especially useful if directory replication must occur over a slow wide area network (WAN) link, and you can use it to ensure that most replication traffic occurs during off hours.
See Also batch commands ,scripting ,Windows Script Host (WSH)
An initiative from Microsoft Corporation to help small businesses get online by providing them with subscription-based services, tips and advice, technology consultants, and other aids.
Overview
Microsoft bCentral is designed to help small businesses get online so they can increase sales, improve their market share, and provide better services to customers. The bCentral initiative is an integral part of Microsoft's .NET strategy of providing software as a service to consumers and businesses.
Services available from bCentral include
Web site hosting packages that range from basic sites to full e-mail services, online advertising, e-commerce, and e-mail newsletters.
Tools and services for advertising your online business, including search engine submission tools, opportunities to advertise on larger well-known sites, and e-mail newsletters for building customer communities.
Back-end business support, from online services for managing your customers and tracking sales leads to secure accounting services for managing your business's finances.
In addition, bCentral services are available to any computer having a Web browser and an Internet connection, so you can manage your online business from anywhere using a laptop computer. Partnerships with companies such as Office Depot provide value-added services such as purchasing office equipment and supplies over the Internet from any location. Many bCentral services have free 30-day trial periods that allow businesses to test these services. Finally, bCentral helps you sell your company's products and services at MSN eShop and through an online auction site developed by Microsoft Corporation and FairMarket.
For More Information
You can find bCentral at www.bcentral.com
Stands for Bearer channel, a circuit-switched channel for carrying voice or data in Integrated Services Digital Network (ISDN) services.
Overview
Such channels are called Bearer channels because they "bear," or carry, the actual information being communicated between the customer premises and the telco's central office (CO). B channels are standard, bidirectional, digital telephone channels that can carry digital information at a rate of 64 kilobits per second (Kbps). Users with greater bandwidth needs can combine several B channels into larger data-carrying pipes. The two most common configurations are
2B+D: Combines two B channels to form a single data pipe with a total bandwidth of 128 Kbps
23B+D: Combines 23 B channels to form a high-speed data pipe equivalent to a T1 line with a total bandwidth of 1.438 megabits per second (Mbps)
Notes
B channels carry voice or data only, not signaling information. D channels carry information for establishment and control of ISDN connections.
See Also 802.10 ,Integrated Services Digital Network (ISDN)
Stands for backup domain controller, a Microsoft Windows NT domain controller containing a read- only copy of the Security Accounts Manager (SAM) database.
See Also backup domain controller (BDC)
A technique used on token-passing networks for monitoring the status of the token-passing process.
Overview
Beaconing is used in Token Ring and Fiber Distributed Data Interface (FDDI) networks to ensure that token passing is functioning properly. On a token-passing network such as FDDI, every station is responsible for monitoring the status of the token-passing process. If a station detects that a fault has occurred, it starts placing beacons onto the ring. When the next station on the ring detects a beacon, it in turn starts placing beacons on the ring and the first station stops transmitting them. This process will continue until the station immediately upstream of the fault location is the only station sending beacons.
Beaconing enables administrators to quickly locate the fault and repair it. Once the fault is fixed, the station emitting the beacon detects its own beacon returning to it after traveling around the ring, and the station stops beaconing.
See Also Fiber Distributed Data Interface (FDDI) ,Token Ring
Stands for Blocks Extensible Exchange Protocol, an emerging framework to replace Hypertext Transfer Protocol (HTTP) for transport of Extensible Markup Language (XML)-based information over the Internet.
See Also Blocks Extensible Exchange Protocol (BEEP)
Any systematic method for performing comparative measurements of computer hardware, operating systems, and their components and subsystems.
Overview
Benchmarking began as system attempts to compare the speed and power of hardware, operating systems, and applications that had similar functions. For example, an early comparison between Microsoft Word and Corel WordPerfect might have been to compare how quickly both applications could spell-check the same 100-page document. In the early days, vendors themselves often performed benchmarking to highlight the superior performance of their products in the marketplace.
To elevate benchmarking to something more consistent and reliable, independent nonprofit organizations have been formed to benchmark certain aspects of system and application behavior. Two of these organizations have achieved a high degree of credibility in the industry, namely Standard Performance Evaluation Corporation (SPEC) and the Transaction Processing Performance Council (TPC).
SPEC's goal is to establish a suite of standardized benchmarks for comparing the performance of computer systems. SPEC licenses its tools for use by vendors, who can publish and report the results on SPEC's Web site. An example is the SPEC CPU2000 benchmark for comparing performance of CPU subsystems, which replaces the popular, but now retired, SPEC CPU95 benchmark.
TPC's goal is to develop standard benchmarking tools and procedures for comparing transactional processing between different database products. A transaction is a form of business action performed by a computer system-for example, an online purchase or sale. Database transactions include inventory control, books, account updates, and similar procedures. TPC benchmarks such as TPC-C for Online Transactional Processing (OLTP) and TCP-W for Web-based e-commerce transactions attempt to mirror real-world transaction processing to compare the performance of database systems from different vendors.
Another popular set of benchmarks are those of media company ZDNet, which has developed its set of Winbench and Winstone benchmarks for compar- ison of business and consumer computer systems and peripherals.
The main difficulty with most benchmarking systems is interpreting them. While trying to mirror real-world effects, benchmarks nevertheless operate under idealized conditions in which certain variables are controlled and others are changed to study the results. The challenge continues to be to develop reliable independent benchmarks that will test significant components of complex real-world systems while maintaining fairness and vendor-neutrality.
For More Information
You can find SPEC at www.spec.orgTPC can be found at www.tpc.orgZDNet can be found at www.zdnet.com
Stands for Be Operating System, an operating system especially developed as a high-performance platform for multimedia applications.
Overview
BeOS was developed by Be, a company founded in 1991 by Jean-Louis Gass e, a former president of Apple Computer's product division. The first version of BeOS became available in 1995, and the current release is version 5.
BeOS is a preemptive multitasking operating system that incorporates pervasive multithreading in which every application has at least two threads, one for application logic and one for the user interface. BeOS also supports eight-way symmetric multiprocessing (SMP). BeOS also includes a 64-bit journaling file system that supports 18 petabytes of direct storage, protected memory, and a Portable Operating System Interface for UNIX (POSIX)-compliant subsystem.
BeOS has an object-oriented set of application programming interfaces (APIs) that are optimized for real-time digital multimedia and communication functions. Because of this, BeOS is sometimes called a "media OS" to emphasize its high-performance multimedia capabilities.
BeOS runs on Intel-based platforms and certain PowerPC-based hardware, and it includes basic Transmission Control Protocol/Internet Protocol (TCP/IP) support and services. On a PowerPC, you can even run the MacOS as a shell within the BeOS desktop interface.
A lightweight version of BeOS called BeIA (Be Internet Appliance) is also being developed for Internet appliances and similar devices.
For More Information
Visit the Be home page at www.be.com
Stands for Bit Error Rate, a measurement of the reliability of a networking architecture or device.
See Also Bit Error Rate (BER)
A popular software tool for administering and maintaining the Domain Name System (DNS) on UNIX platforms.
Overview
Berkeley Internet Name Domain (BIND) was originally written for 4.3BSD UNIX and replaced an earlier domain naming system called JEEVES. BIND is now maintained by the Internet Software Consortium (ISC) and its current major version is BIND 9.
Because most versions of UNIX include some sort of BIND with their distributions and a majority of Internet Service Providers (ISPs) still use the UNIX platform for much of their operations, BIND is still the most popular DNS server on the Internet. BIND is also freely distributed by the ISC and is available for AIX, HP-UX, Irix, Solaris, SunOS, and other operating systems such as Linux and Windows NT.
Notes
The DNS Server services of Microsoft Windows 2000 and Windows .NET Server are Request for Comments (RFC)-compliant implementations of DNS and are fully compatible with BIND. Active Directory directory service can also use BIND as its DNS naming service, provided BIND 8.1.2 or later is used. If you choose to use BIND with Active Directory, make sure you disable name checking on your BIND server because Active Directory uses the underscore character in its SRV records and BIND name checking flags this character as an illegal character.
For More Information
Visit the Internet Software Consortium at www.isc.org
See Also Active Directory ,Domain Name System (DNS) ,Internet ,UNIX
Stands for Bit/Block Error Rate Tester, a device used to troubleshoot serial lines.
See Also Bit/Block Error Rate Tester (BERT)
Used to describe network communications in which delivery of data is not guaranteed.
Overview
Routable internetworking protocols such as Internet Protocol (IP) and Internetwork Packet Exchange (IPX) use best effort delivery based on datagrams. In other words, delivery of data by these protocols is not guaranteed. The reason is that these protocols are connectionless in operation, and acknowledgements are not returned as they pass from one hop to the next across a routed internetwork.
An example where communications may fail is what is called a "black hole." In this situation, a failed router drops packets it is supposed to forward, and the station from which the packets originated is unaware that these packets never reached their destination.
See Also black hole ,Internet Protocol (IP) ,routing
Stands for Border Gateway Protocol, an exterior routing protocol used on the Internet to provide loop-free routing between different autonomous systems (ASs).
See Also Border Gateway Protocol (BGP)
A platform from QUALCOMM for developing applications for cellular communications systems.
Overview
Binary Runtime Environment for Wireless (BREW) was developed by QUALCOMM as an alternative to Java 2 Micro Edition (J2ME) from Sun Microsystems. Although both platforms enable downloading of applications over wireless phones, BREW has been designed from the ground up to work effectively in the cellular environment and J2ME is a general-purpose developer environment for small devices. BREW's main disadvantage is that it was designed with QUALCOMM's Code Division Multiple Access (CDMA) cellular technology in mind, but J2ME is device- and technology-independent.
A number of companies have committed to building products and services that use BREW, including Wireless Knowledge and Visto Corp.
For More Information
Find out more about BREW at QUALCOMM's Web site at www.qualcomm.com/brew.
See Also cellular communications
A draft specification for a routing protocol to save the Internet from its projected meltdown on or around April 1, 2003.
Overview
Because of the proliferation of Autonomous System Numbers (ASNs) used to identify internetworks connected to the Internet and due to the limited pool of possible ASNs, which is quickly drying up, analysts predict that no more ASNs will be available on or around April 1, 2003. At that point the Internet is expected to collapse.
A proposed solution soon to be presented to the Internet Engineering Task Force (IETF) is the Binary Tulloch Transport Protocol (BTTP). BTTP addresses the underlying issue of ASNs running out by assigning a binary flag (1=on and 0=off) to each ASN, allowing half the ASNs connected to the Internet to be temporarily revoked while the other half remain available at any given time. The protocol switches ASNs between these two states at a frequency of 1000 times per second; in other words, autonomous systems are online one millisecond and off the next, effectively reducing the size of the Internet by half at any given moment and thus giving room for several more years of expansion and growth of the Internet before the problem becomes critical again. Since the average latency for establishing Internet connections is around 20 milliseconds for wired connections (and several hundred milliseconds for satellite links), this is clearly sufficient time for connections to be established with Internet hosts whose networks are rapidly switching on and off.
For More Information
You can find out more about BTTP and its creator, Mitch Tulloch, at www.mtit.com
Stands for Berkeley Internet Name Domain, a popular software tool for administering and maintaining the Domain Name System (DNS) on UNIX platforms.
See Also Berkeley Internet Name Domain (BIND)
In Novell's NetWare version 3.x and earlier networking operating systems, the database containing network security information (such as users, groups, and rights) for a particular server.
Overview
Each NetWare 3.x server has its own bindery for controlling access to that server's file and print resources. In version 4.x and later, the bindery is replaced by the Novell Directory Services (NDS), although 4.x servers are also capable of running in bindery emulation mode.
Microsoft's optional Microsoft Windows 2000 Server service Gateway Services for NetWare (GSNW) can be used to implement gateways to resources located on NetWare file and print servers that are using bindery security. This allows Windows users to access volumes, directories, and print queues on NetWare servers without requiring NetWare client software to be installed on them. Client Services for NetWare (CSNW) can also be installed on client machines running Windows 2000 Professional and Windows XP to enable them to directly access bindery-based NetWare 2.x , 3.x , or 4.x servers that are running in bindery emulation mode.
See Also Client Services for NetWare (CSNW) ,Gateway Service for NetWare (GSNW) ,Novell Directory Services (NDS)
A mechanism for linking the various components of an operating system that make network communications possible.
Overview
Bindings link together network interface card (NIC) drivers, network protocols (such as Transmission Control Protocol/Internet Protocol [TCP/IP]), and networking services (such as Workstation service). Microsoft Windows 2000, Windows XP, and Windows .NET Server let you optimize network communication by selectively enabling, disabling, and modifying the order of the bindings between these different networking components. Windows 2000, Windows XP, and Windows .NET Server support Network Driver Interface Specification (NDIS) version 5, which allows multiple protocols to be independently bound to multiple NICs.
Binding. Configuring bindings in Windows 2000.
To configure bindings for Windows 2000, choose Advanced Settings from the Advanced menu of the Network And Dial-Up Connections window, which is accessed from Control Panel. In this way bindings can be easily enabled, disabled, or reordered. To optimize network performance, disable any unnecessary bindings on your workstations.
See Also network driver interface specification (NDIS)
Any authentication scheme that uses an aspect of a person's physical body or behavior to verify that person's identity.
Overview
Biometric authentication (or biometric identification) has been employed for years for entry-access control of high-security environments such as military compounds and virology laboratories, but only recently have commercial products become available for securing computer networks. Biometric authentication mechanisms take many forms, including
Fingerprint or thumbprint identification devices
Face-recognition systems (measure dimensions of prominent facial features)
Iris-scanning devices (retina scanners are much more rare and expensive)
Voice-print identification systems (usually a sound card, microphone, and software)
Biometric trackballs and mice (measures vein patterns, creases on the palm, or density of fatty tissue using infrared lasers)
Some biometric authentication systems measure behavior patterns instead of physical features. An example is BioPassword from Net Nanny Software International, which requires a user to enter a password on a keyboard and then compares the way the user typed the password with information stored in a database.
Biometric authentication systems must be designed carefully in order for them to be truly secure. For example, a simple voice-print authentication system could be fooled by using a tape recording of the user's voice. To guard against this, these systems commonly ask the user to speak a randomly generated series of words into the microphone, which renders such tape recordings useless.
Biometrics will probably soon make their way into the wireless arena as well. Cellular communications vendor Nokia has prototyped a biometric-enabled cell phone, which would make stealing such a phone useless. The main barrier against this development is cost-cell phones are mass-produced cheaply and even a biometric component costing $10 per phone could break the cost model.
Another general barrier to all forms of biometric authentication systems are privacy issues regarding having digital information about your physical makeup stored on a device that could be stolen or misused. Despite these concerns, the biometrics market in 1999 was $166 million and is rising rapidly.
Notes
When implementing biometric authentication systems, be sure to consider fallback authentication options should the biometric device fail. Costs of purchasing and deploying such systems across an enterprise may also be considerable, and help desk departments might find it more time-consuming to troubleshoot a faulty sound card of a voice-print authentication system than simply resetting a user's traditional text-based password.
See Also network security
Stands for broadband ISDN, the broadband transmission counterpart of Integrated Services Digital Network (ISDN).
See Also broadband ISDN (B-ISDN)
A device used to troubleshoot serial lines.
Overview
A Bit/Block Error Rate Tester (BERT) is a kind of cable tester specially designed for testing serial lines. BERTs can be connected to serial ports on PCs, routers, and other devices to provide a visual indication of the condition of the serial interface.
A typical BERT is a small box with a 25-pin serial connector and 25 light-emitting diodes (LEDs), one for each lead of the interface. A quick visual inspection can provide information about whether data is being reliably transmitted across the interface. You can also use jumpers to make or break specific leads to see the effect-this simulates the effect of crossed wires and can be used to detect such wires in miswired serial cables or connectors.
See Also test equipment
A measurement of the reliability of a networking architecture or device.
Overview
Bit Error Rate (BER) is expressed in terms of probability of a bit of data being lost while being transported over a network or processed by a device. As an example, standard (10 megabits per second [Mbps]) Ethernet over copper specifies a maximum BER of 10-8 , which means only 1 out of every 100,000,000 (100 million) bits transported can be allowed to be lost. This is actually a worst-case scenario, however, as actual Ethernet networks generally have a BER of 10-11 or better, meaning that only 1 out of every 100,000,000,000 (100 billion) bits is lost. Fast Ethernet and Gigabit Ethernet (GbE) have BERs an order of magnitude smaller.
An associated measure for Ethernet reliability is Frame Loss Rate (FLR), which for Ethernet networks is typically 10-7 , or 1 frame lost in every 10,000,000 (10 million) frames transported. Lost frames are handled by higher-level layers of the Open Systems Interconnection (OSI) model and are ignored by the Data Link Layer.
See Also Ethernet
A unit used for measuring the speed of transmission of data on a network of computers.
Overview
Bits per second, or bps, represents the rate at which information is being sent or received. A bit is a single unit of digital information, represented by either a 1 or a 0. The total number of bits per second that can be transmitted over a network link describes the bandwidth or throughput of that link.
Because most network communication takes place at thousands or millions of bits per second, the following related units are commonly used:
Kbps = kilobits per second (103 bps)
Mbps = megabits per second (106 bps)
Gbps = gigabits per second (109 bps)
See Also bandwidth
An initiative from Microsoft Corporation to standardize the exchange of electronic documents between businesses.
Overview
Businesses exchange information for various reasons:
Product invoicing and delivery
Supply-chain management
Electronic catalogs and ordering systems
BizTalk is designed to standardize these processes using Extensible Markup Language (XML) as a foundation for creating a standard "electronic envelope" for exchanging electronic documents between businesses.
BizTalk actually consists of four interlocking facets:
BizTalk Framework: A framework for developing XML schemas to serve different sectors of business and industry. BizTalk Framework provides a set of rules and a collection of base XML tags for building new schema for B2B e-commerce. These tags provide the "envelope" that ensures electronic documents reach their intended recipient. See the article "BizTalk Framework" later in this chapter for more information.
BizTalk server: Any software that can read and process documents formatted according to the BizTalk Framework is called a BizTalk server. BizTalk servers can be third-party applications developed using any programming language and running on any operating system platform and can be designed for either front-end or back-end exchanges of B2B documents.
BizTalk Server 2000: Microsoft's own version of a BizTalk server, which runs on the Windows 2000 platform and provides orchestration of business processes and XML document exchange. BizTalk Server 2000 can transmit XML and Simple Object Access Protocol (SOAP)-based messages over a variety of transports including Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), and others.
BizTalk.org: A site devoted to the support and proliferation of BizTalk.
For More Information
Visit the BizTalk resource site at www.biztalk.org
See Also B2B ,BizTalk Framework ,BizTalk Server 2000 XML
A specification describing the architecture of BizTalk messages.
Overview
BizTalk Framework is part of the BizTalk initiative from Microsoft Corporation to facilitate the exchange of electronic documents and orchestration of business processes between trading partners, supply-chain partners, and other business partners. BizTalk Framework is designed to be the underlying document standard for B2B e-commerce and is based on the standard Extensible Markup Language (XML) specification.
Architecture
When two businesses in a B2B relationship need to exchange information electronically, the first step is to decide on a common XML schema to use that both can understand. A schema defines the type of content being transmitted and the structure of the document containing it. Microsoft has established the site www.biztalk.org as a resource site for businesses to develop and publish BizTalk schemas for their industry sectors.
BizTalk Framework. Format for a BizTalk Message.
A BizTalk message consists of two parts: the Transport Envelope and the BizTalk Document.
The Transport Envelope specifies the transport protocol used to deliver the message. BizTalk Server 2000, Microsoft's own implementation of a platform for building BizTalk solutions, supports a number of different transports, including
Hypertext Transport Protocol (HTTP)
HTTP over Secure Sockets Layer (SSL), or HTTPS
Simple Mail Transfer Protocol (SMTP)
File Transfer Protocol (FTP)
Microsoft Message Queue Server (MSMQ)
Application Integration Components (COM building blocks)
Fax
The other portion of a BizTalk message, the BizTalk Document itself, consists of the following parts:
BizTalk Header: Specifies the source address, destination address, subject, transmission time and date, and document manifest describing the type of document being transmitted (such as invoice, purchase order, or service request).
Document Body: Contains the actual business documents formatted in XML using the agreed-upon schema. If the manifest indicates an invoice, the body describes things such as type of item sent, quantity, payment requested, and sales tax.
See Also BizTalk ,BizTalk Server 2000 XML
Microsoft Corporation's platform for exchange of business documents and orchestration of business processes using the BizTalk Framework.
Overview
BizTalk Server 2000 is one of the new Microsoft Windows 2000 Server applications. BizTalk Server 2000 is used for building B2B e-commerce through using Extensible Markup Language (XML) to deliver business documents such as sales orders, invoices, and service requests. BizTalk Server 2000 can transmit both XML and Simple Object Access Protocol (SOAP)-based messages. It can use a variety of transports for accomplishing this, including Hypertext Transport Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), File Transfer Protocol (FTP), and others.
For More Information
Find out more about BizTalk Server 2000 at www.microsoft.com/biztalk.
See Also BizTalk ,BizTalk Framework XML
Microsoft Corporation's code name for its upcoming successor to the Windows .NET Server family of operating system platforms.
Overview
"Blackcomb" is planned for release sometime after the release of Windows .NET Server, which had the code name "Whistler." "Blackcomb" will be the first fully .NET version of Microsoft Windows and will be an integral platform for developing and deploying Microsoft's .NET vision of software-as-services.
At this point, little is known about "Blackcomb," but at the Windows Hardware Engineering Conference (WinHEC) in March 2001, Microsoft unveiled some of its intended features, including
New services for Application Service Providers (ASPs) to deploy and manage .NET Web services running on Blackcomb.
Dynamic partitioning of servers for greater reliability in mission-critical scenarios.
Greater communications capabilities and an enhanced user interface.
Notes
Whistler and Blackcomb are two ski resorts in British Columbia, Canada, only a few hours away from Microsoft's headquarters at Redmond, Washington.
For More Information
Find out about the latest developments with the Microsoft Windows series of operating system platforms at www.microsoft.com/windows.
See Also Microsoft Windows
A network condition in routed internetworks where packets are dropped without any explanation to the transmitting host.
Overview
A black hole is generally caused by a router that goes down and whose absence from the network is not detected by other routers. Packets that are forwarded to the black hole are dropped-that is, they never reach their destination and give no indication to the stations sending them of the situation-therefore, the data is lost. Normally, a router will issue an "ICMP Destination Unreachable" message when it cannot forward a packet. However, with a black hole, these messages are not generated, so the transmitting host does not know that data is being permanently lost.
If static routing is being used, a black hole persists until the affected router is brought back on line or until other static routers have their routing tables reconfigured to take the downed router into account. If dynamic routing is used, other routers soon detect the presence of the black hole and adjust their routing tables accordingly to favor other paths.
Black holes can also originate when routers that are active nevertheless drop certain packets for specific reasons. An example is when the Path Maximum Transmit Unit (PMTU) is configured for a router so that it discards Internet Protocol (IP) packets that need to be fragmented in order to be forwarded. If a PMTU router is not configured to also forward indications of dropped packets to transmitting hosts (and by default they are not so configured), then the network problems they produce can be difficult to detect since some (smaller) packets get through successfully while other (larger) packets mysteriously disappear.
The reason, of course, why this condition is known as a "black hole" is its parallel with black holes in Einstein's theory of General Relativity. Einstein's black holes are collapsed stars that swallow everything and from which not even light can return.
See Also routing
Stands for Building-centric Local Exchange Carriers, a telecommunications carrier focused on the Multitenant Unit (MTU) market.
See Also Building-centric Local Exchange Carrier (BLEC)
An encoding scheme whereby groups of data bits are encoded into a larger number of code bits.
Overview
A variety of block codes are used for encoding transmissions for networking and telecommunications systems. Examples of some common ones include
4B/5B: This packages four bits of data into five code bits and is used by 100 megabits per second (Mbps) Ethernet and Fiber Distributed Data Interface (FDDI).
8B/6T: This packages eight bits of data into six ternary (base-three) code symbols and is used by 100BaseT4 Ethernet.
5B/6B: This packages five bits of data into six code bits and is used by 100VG-AnyLAN.
The reasons for making the "code space" larger than the "bit space" in these encoding schemes are to allow for additional data characteristics to be included in transmissions and to make room for control signals to manage the flow of data or check for error conditions.
See Also line coding
An emerging framework to replace Hypertext Transport Protocol (HTTP) for transport of Extensible Markup Language (XML)-based information over the Internet.
Overview
Blocks Extensible Exchange Protocol (BEEP) is a proposed framework for a protocol that would run on top of Transmission Control Protocol (TCP) as an alternative to HTTP. It is designed to facilitate the exchange of XML-framed information for a variety of uses, including file transfer, instant messaging (IM), and network management.
BEEP has been proposed because HTTP was not originally intended for XML data transport and performs poorly when performing this function. BEEP uses a peer-to-peer (P2P) architecture instead of the client- server one used by HTTP. In a typical scenario, BEEP first establishes a connection between two hosts on a network. The hosts alternate between client and server roles to allow two-way communications between them over a channel. Hosts can choose either to push or pull data between themselves. An advantage of BEEP is that unlike HTTP, a single BEEP connection can open multiple channels for exchange of XML data, which means, for instance, that files could be transferred through one channel while an IM chat session occurs on another.
The BEEP framework also includes a toolkit for rapid development of custom application protocols that would run on top of BEEP to efficiently handle specific types of communications tasks. In effect, BEEP would provide reusable code that would greatly facilitate the development of such special-purpose protocols.
BEEP is being presented as a draft standard to the Internet Engineering Task Force (IETF) for consideration, and the framework is outlined by RFCs 3080 and 3081. BEEP's development has been spearheaded by the company Invisible Worlds.
Notes
BEEP was formerly known by the acronym BXXP.
For More Information
Visit Invisible Worlds at www.invisibleworlds.com
See Also Hypertext Transfer Protocol (HTTP) ,XML
In Microsoft Windows platforms, a blue screen on a user's monitor indicates that something has gone seriously wrong with the system.
Overview
In Windows 2000, Windows XP, and Windows .NET Server, blue screens are normally called stop screens. A stop screen contains complex information that qualified support technicians can use to diagnose the problem. A reboot might get the system going again, but the stop screen might reappear if the problem is not resolved. The problem causing the stop screen to appear can be either hardware-related or software-related, but the stop screen itself is generated by the operating system in response to the underlying problem.
In Windows 95 and Windows 98, the blue-colored screen normally appears when parity errors or memory violations occur. Parity errors can indicate that your system random access memory (RAM) has mismatched single inline memory modules (SIMMs) on your motherboard-for example, RAM with different speeds or a mix of parity and nonparity RAM. Also, systems from some manufacturers require special proprietary RAM in order to function. You should consult the documentation from your computer's manufacturer or your RAM's manufacturer to ensure that you have the correct type of RAM in each slot. The Windows 98 blue screen requests that you either shut down the offending application or restart your system using Ctrl+Alt+Delete.
An evolving specification for short-range wireless transmission between small portable devices in a Personal Area Network (PAN).
Overview
Bluetooth is a wireless networking technology that promises to provide a simple, low-cost method of linking together cellular phones with headsets, Personal Digital Assistants (PDAs) with printers, and similar ad hoc associations between devices in a PAN. A PAN is essentially a network of portable devices carried by a user or devices within which a user comes into close proximity by movement. The vision of Bluetooth actually extends beyond personal data networking to a nirvana world of wireless devices that includes milk containers that signal refrigerators when they are almost empty, whereupon the refrigerator orders more milk using an Internet connection. Needless to say, not everyone expects (or even wants) this brave new world to happen!
Original work on the Bluetooth specification dates back to 1994 when cellular phone manufacturer Ericsson first outlined the technology. The original intention was to provide a way to connect wireless headsets with cellular phones, but the Bluetooth specification has evolved far past this initial goal. In 1998 a consortium called the Bluetooth Special Interest Group (SIG) was created, and it published its first specification in 1999. The original members included Ericsson, its rival Nokia, and other industry leaders such as IBM, Intel Corporation, and Toshiba Corporation. This consortium has grown to include over 2000 different vendors, and the current Bluetooth specification is version 1.1.
The success of the Bluetooth SIG is based largely on the fact that companies that join must grant a royalty-free license to all other members of the alliance for any Bluetooth-related technology they develop. The SIG's main purpose is to develop specifications for real-world interoperable Bluetooth products-it is not a standards body, and the intention is that any specifications developed by the SIG will be passed on to the Institute of Electrical and Electronics Engineers (IEEE) for final standardization.
Because of the original vision of Bluetooth for small handheld devices, a consistent goal of the Bluetooth SIG has been to develop Bluetooth technology that can be implemented on a single chip. Much success has been achieved in that respect, with chip prices in large lots coming down to the $4 range.
Architecture
Bluetooth is based on baseband FM transmission using frequencies between 2.4 and 2.4835 gigahertz (GHz) within the unlicensed 2.4-GHz Industrial, Scientific, and Medical (ISM) band. Bluetooth divides this band of frequencies into 79 separate channels, and transmission uses a frequency-hopping scheme to hop between channels randomly at a rate of 1,600 hops per second. The result is that a different frequency is used to transmit each packet of a Bluetooth transmission. The advantage of such aggressive frequency-hopping is to provide smooth operation by minimizing the effects of fading due to reflecting obstacles and overcoming noise due to electromagnetic interference (EMI) generated by microwave ovens and other devices. Bluetooth also uses short packets and fast acknowledgments to increase reliability and employs forward error correction to reduce the effects of random noise.
Bluetooth's data transmission rate is 1 megabit per second (Mbps), but with protocol overhead the resultant practical maximum transmission rate is more like 780 kilobits per second (Kbps) or lower. Bluetooth uses a shared-media transmission scheme similar to Ethernet in which only one device in a group of connected devices can transmit at any one time, and duplex transmission is simulated through time-division multiplexing of simplex transmissions. The result is that a PAN with many Bluetooth devices will perform more poorly than one with only a few devices, but this is not considered a serious disadvantage since the specification was designed to be a lightweight one from the beginning.
Given its aim of supporting devices in PANs, Bluetooth is a low-power technology with a maximum range of transmission of 33 feet (10 meters). Bluetooth's automatic power adaptation adjusts transmission power to the minimum needed for reliable transmission in any given situation to enhance battery life in portable devices.
The Bluetooth protocol suite is centralized around the Logical Link Control and Adaptation Protocol (L2CAP). This protocol supports two data transmission modes:
Asynchronous packet-switched communications with simplex speeds of 721 Kbps in the forward direction and 57.6 Kbps in the reverse.
Synchronous circuit-switched communications for duplex communications over three 128 Kbps channels for a total bandwidth of 432.6 Kbps in each direction.
The Application Layer of the Bluetooth protocol suite is implemented as a series of "profiles" representing operating parameters for different kinds of uses of Bluetooth. Currently, 13 different application layer profiles have been developed under the specification, and Bluetooth systems are required only to implement a core subset of these together with other profiles needed for their operation.
Other Bluetooth protocols include the Link Manager Protocol (LMP), which manages device authentication for forming new connections, and the Service Discovery Protocol (SDP), which maintains the browse list of accessible devices.
Security is built into Bluetooth at the data-link level and provides the following services:
Authentication: Bluetooth has built-in device authentication, while user authentication needs to be implemented at the application level. Once a device has been authenticated, it is then considered "trusted" by all other devices in the ad hoc PAN.
Authorization: This is used to control which services are accessible from which devices. For example, a Bluetooth-enabled PDA is authorized to print to a similarly enabled printer but not to a Bluetooth cell phone.
Encryption: Bluetooth includes support for 128-bit encryption. In addition, the frequency-hopping transmission scheme employed by Bluetooth helps guard against eavesdropping by unauthorized users.
Implementation
Bluetooth supports concurrent connections among up to eight devices, forming what is called a piconet. Each device in a piconet is temporarily assigned a unique 3-bit MAC address for the duration of the connection. A master/slave relationship exists between one device and all other devices in the piconet for the duration of the connection. The purpose of this is for establishing clocking to synchronize devices for using the hopping sequence. In all other respects, the devices operate as peers during a connection.
Unconnected Bluetooth devices are always on in a standby mode where they listen for connection attempts every 1.28 seconds on each of 32 preassigned hopping frequencies. Once a compatible device is found, link setup and authentication is then performed using the Link Manager Protocol (LMP), which uses the link controller services built into the Bluetooth chip. Connections between Bluetooth devices can be either point-to-point or point-to-multipoint, and groups of piconets can be joined together into larger associations called scatternets, with each piconet within a scatternet having a uniquely different hopping sequence.
Marketplace
The Bluetooth marketplace is still in its infancy, but some of the highlights are as follows:
Bluecore, the first working Bluetooth chip, was developed by British startup Cambridge Silicon Radio. This was incorporated into the first commercial Bluetooth product, a Bluetooth-capable CompactFlash expansion card named Bluecore CF+, which was developed by California-based Socket Communications for the Microsoft Windows CE platform of portable devices. Since then other Bluetooth chips have been developed by major players such as Ericsson, Intel Corporation, and Motorola.
RocketChips (www.rocketchips.com) has developed a vision for integrating Bluetooth onto CPU chips within PCs; in other words, a no-chip solution instead of the usual single-chip solution. If this vision is implemented, Bluetooth could become as ubiquitous as the PC.
Red-M (www.red-m.com) has developed a complete Bluetooth solution including access server, access point, and PC cards for clients.
Ensure Technologies has developed a Bluetooth security card that users wear and that can automatically unlock their PCs when they come near them.
Major vendors developing Bluetooth PC cards include Toshiba, Compaq, Hewlett-Packard, and others. Motorola is producing a PC combo card with a V.90 modem and a Bluetooth chip combined.
IBM is currently licensing Bluetooth device driver software for the Linux platform and plans similar software for Microsoft Windows platforms. IBM has also prototyped a Bluetooth-enabled PDA called WatchPad that a user wears on the wrist like an ordinary watch.
3Com Corporation and Extended Systems are planning on delivering a set of management tools, protocol stacks, and software development kits (SDKs) for developing Bluetooth-based solutions for the Microsoft Windows platform.
Palm plans on integrating support for Bluetooth in its next version of the PalmOS.
Intesil Corporation is working on dual 802.11b/Bluetooth chipsets for overcoming issues relating to interference between the two wireless networking technologies.
Ericsson, the initial force behind Bluetooth's development, has released Bluetooth adapters for some of its cellular phone models that enable wireless connectivity between phone and headset.
The Bluetooth SIG holds a yearly conference called Unplugfest where old and new vendors of Bluetooth products meet to test interoperability between their different implementations of the specifications. Because of the specification's evolving nature, early-to-market products based on the 1.0 specification may have compatibility issues with products based upon the newer 1.1 standard.
Issues
Using the ISM band for Bluetooth communications has been problematic. The ISM band is supposedly reserved worldwide for unlicensed communications, but governments in some countries and regions have licensed portions of this band for specific uses. The problem is of special concern in Spain and France, which have only a narrow portion of the band available, and the Bluetooth specifications have been massaged to produce a special version of the specification technically able to function under these restrictions, but legal restrictions prohibit its use in these two countries to prevent the jamming of other services. The reason this is such an issue is that, due to the multiplication of different specifications, Bluetooth cellular phones will not be able to easily function throughout Europe as originally envisioned by Ericsson.
Another issue is that not only is the ISM band also used by other wireless networking technologies such as 802.11b and HomeRF, but it is also used for non- networking applications such as garage door openers, microwave ovens, cordless telephones, telco local loop systems, baby monitors, medical scanners, and various other business and consumer devices. By using an aggressive frequency-hopping scheme, Bluetooth is fairly resistant to interference from these different systems, but that very fact means that Bluetooth easily interferes with the operation of these other systems. Tests have shown, in fact, that communications over 802.11b wireless networks can be degraded and even disrupted by nearby Bluetooth devices. The result has been that large companies that rely heavily on 802.11b wireless networks have instituted policies to ban Bluetooth devices from the premises.
Besides the threat to 802.11b local area networks (LANs), Bluetooth poses dilemmas for other industries as well. The airline industry has voiced particular concern that Bluetooth devices carried by different passengers might detect each other during a flight, turn themselves on, and generate transmissions that could disrupt an aircraft's sensitive navigation equipment. The Bluetooth SIG is attempting to allay these concerns through further refinement of the specifications.
Prospects
Despite issues relating to interference with 802.11b wireless local area networks (WLANs) and whether ad hoc always-on wireless networking is desirable or even safe, Bluetooth has a great deal of momentum from industry and products are likely to be widely available soon. In addition to consumer-oriented applications for PANs and wireless public access kiosks, Bluetooth may also find some place in the enterprise as a cable- replacement technology.
Only time will tell, however, whether a Bluetooth- enabled can of beer will someday communicate with a similarly enabled refrigerator to ask it to lower the temperature for just the right taste.
Notes
The goals of Bluetooth and 802.11b are different: although 802.11b was specifically developed mainly for laptop computers as a wireless replacement for wired Ethernet LANs, Bluetooth is optimized for forming short-range ad hoc networks for connecting smaller portable devices such as cell phones and PDAs. The implementations of these technologies, although confined to the same ISM frequency band, are also different: Bluetooth uses frequency-hopping, but 802.11b uses spread-spectrum transmission.
The interesting name "Bluetooth" comes from Harald Bluetooth, the Viking who in the 10th century unified Norway and Denmark.
Bluetooth also supports voice transmission that use up to three concurrent synchronous 64-Kbps voice-only channels or one channel that simultaneously supports both asynchronous data and synchronous voice transmission. The voice channels use the continuous variable-slope delta modulation-coding scheme.
A competing technology for PANs besides Bluetooth is the Infrared Data Association (IrDA) protocol, but while IrDA devices require line-of-site communication, Bluetooth devices overcome this restriction. IrDA does have certain advantages however, including much greater data transmission rates.
For More Information
You can find the Bluetooth SIG at www.bluetooth.com
See Also 802.11b ,802.15 ,Infrared Data Association (IrDA) ,Personal Area Network (PAN) ,piconet ,wireless networking
A group of connectors used for joining thinnet cable segments together and for connecting thinnet cabling to 10Base2 network cards.
Overview
BNC connectors are used on 10Base2 (thinnet) Ethernet networks and use a twist-and-lock mechanism that provides a secure connection between network cabling and components. The male connector has a center pin with a rotating ring with projections that mate with the female connector.
The various types of BNC connectors include the following:
BNC cable connector: Soldered or crimped to the ends of a thinnet cable
BNC T-connector: Used to connect a network interface card (NIC) to a thinnet cable segment
BNC barrel connector: Used to connect two pieces of thinnet cable
BNC terminator: Provides a 50-ohm termination for the free end of a thinnet cable
Notes
Several possibilities are usually suggested as to the origin of the term BNC :
British Naval Connector
Bayonet Nut Connector
Bayonet-Neill-Concelman (probably the correct explanation since the connector was named after Neill and Concelman, its two creators)
For situations where large mechanical loads may affect cabling, a threaded form of the connector is available called TNC.
See Also connector (device) ,terminator
A NetBIOS name resolution method used by Microsoft Windows NT in which broadcast messages are used for name registration and resolution.
Overview
Name resolution is the process of converting the name of a host on the network into a network address (such as an Internet Protocol [IP] address). Name resolution must be performed in order to establish communication over a Windows NT network. B-node is one of four basic methods supported by Windows NT for resolving NetBIOS host names-that is, computer names-into IP addresses.
If a computer running Windows NT is configured as a B-node machine, it always uses broadcasts to resolve names of other hosts on the network. For example, if a B-node machine wants to communicate with another machine with the NetBIOS name SERVER7 (for example, if it wants to connect to a shared resource on SERVER7), the B-node machine broadcasts a packet containing a NetBIOS name query request. If SERVER7 receives the packet, it responds by returning a frame containing its IP address. If SERVER7 is off line or fails to return a response, the B-node client will be unable to establish a connection with SERVER7.
As a name resolution method, B-node is flawed in two ways:
Since broadcast packets are used, B-node consumes network bandwidth and can degrade overall network communication in a busy network.
Since routers are usually configured to not forward broadcast packets, B-node clients can resolve only the NetBIOS names of hosts on the client's local subnet.
A better approach to NetBIOS name resolution on Windows NT networks is to configure clients as H-node machines and use a Windows Internet Naming Service (WINS) server. H-node is a NetBIOS name resolution method that combines B-node and P-node.
Notes
On Windows 2000 and Windows .NET Server networks, the Domain Name System (DNS) is the preferred name resolution scheme, and NETBIOS can be disabled when there are no longer any downlevel Windows NT machines left after an upgrade is complete. Note, however, that Windows 2000, Windows XP, and Windows .NET Server systems based on the Active Directory directory service must be configured with the IP address of a WINS server in order to communicate with any Windows-based systems that are not Active Directory-based, including other Windows 2000, Windows XP, and Windows .NET Server systems.
See Also H-node ,M-node ,NetBIOS name resolution ,P-node
A term used to describe a variety of different technologies for aggregating multiple wide area network (WAN) links together to form a single fatter pipe.
Overview
In Integrated Services Digital Network (ISDN) and T-carrier transmission technologies, bonding provides a way of combining multiple DS0 channels from different circuits into a single, faster data transmission channel. This is accomplished using inverse multiplexing technologies together with special techniques for resolving the timing differences found among groups of different circuits.
ISDN Bonding is typically found in Basic Rate Interface ISDN (BRI-ISDN) where it is used to combine the two 64-kilobits-per-second (Kbps) B channels into a single 128-Kbps data transmission channel. Several different bonding protocols can be implemented for BRI-ISDN services, a common one being Multilink PPP (MPPP), which is used for asynchronous bonding.
Bonding must be supported by the ISDN devices at both ends of the ISDN link. Typically, one of the B channels is designated as responsible for initiating the bonding process. Many ISDN terminal adapters can override bonding when the user wants to place a regular Plain Old Telephone Service (POTS) phone call. For example, you might be using ISDN for high-speed Internet access with both B channels bonded to give you 128-Kbps (or 14-kilobyte-per-second [KBps]) access. Then, if you suddenly pick up a phone connected to the terminal adapter's POTS jack, bonding stops and the second B channel is freed up for the phone call. Once the call is complete, bonding will resume.
Another WAN technology that uses bonding is digital subscriber line (DSL). By configuring the DSL Access Multiplexer (DSLAM) at the service provider's central office (CO), hardware bonding can be implemented to link multiple DSL connections into a single high- bandwidth pipe.
An alternative to hardware bonding for DSL is customer premises equipment (CPE) bonding in which Multilink PPP is used to aggregate multiple DSL circuits at the customer premises instead of the DSLAM. This newer form of bonding has the advantage of being easier to deploy and configure than hardware bonding, which often requires costly upgrades of DSLAMs. A market example is Netopia, a DSL service provider that offers bonding of up to four Internet Digital Subscriber Line (IDSL) lines.
DSL bonding has several advantages:
Customers requiring greater bandwidth than can be afforded by a single DSL link can use bonding to deploy better than T1 services for much less the cost of a T1 line.
Customers who are too far from their telco CO can use bonding to boost DSL carrying capacity to typical DSL speeds at twice the normal distance from customer premises to CO. For example, Netopia's IDSL bonding can provide up to 576 Kbps at distances up to 35,900 feet (10,940 meters) from the CO, which is almost double the normal DSL limiting distance of 18,000 feet (5500 meters).
See Also Digital Subscriber Line (DSL) ,Integrated Services Digital Network (ISDN) ,Multilink Point-to-Point Protocol (MPPP)
A term used to refer to the process of starting a computer, as in the phrase, "Please boot the computer."
Overview
The term boot also refers specifically to the series of steps by which a computer locates and loads the operating system once the power is turned on. This series of steps is usually referred to as the boot sequence or boot process, and it depends on both the type of operating system installed on the machine and the type of hardware platform (for example, x86 platform or Alpha platform).
The term warm boot refers to resetting the system or rebooting using Ctrl+Alt+Delete. The power to the system is not interrupted during a warm boot, but the boot process starts again from the beginning using the system basic input/output system (BIOS).
The term cold boot refers to shutting down a computer and actually turning off the power source and then turning it back on. Cold boots are sometimes necessary after installing or configuring some legacy hardware devices to ensure that the devices are properly initialized. For example, if you change the configuration parameters of an internal modem, you sometimes need to cold boot your system for these changes to take effect.
See Also boot files ,boot process
Files needed to boot an operating system on a computer.
Overview
Every operating system has its own set of boot files needed to locate, load, and initialize the operating system during the boot sequence. For example, MS-DOS and Windows 3.x use the hidden files Io.sys and Msdos.sys and the file Command.com. Configuration information stored in the text files Config.sys and Autoexec.bat is also used during the process.
On Windows 95, Windows 98, and Windows Millennium Edition (Me), the files used for booting are Io.sys, Msdos.sys, and Win.com, with the files Config.sys and Autoexec.bat used optionally to support legacy hardware.
The files needed to boot Windows NT vary depending on whether the x86 or Alpha processor platform is used.
The files needed to boot Windows 2000, Windows XP, and Windows .NET Server (and Windows NT on x86) include the following:
Boot.ini
Bootsect.dos
Hal.dll
Ntdetect.com
Ntbootdd.sys
Ntldr
Ntoskrnl.exe
The Windows 2000, Windows XP, and Windows .NET Server boot process also makes use of other files, including device drivers and the system hive.
See Also boot ,boot process
A file used to create the boot loader menu in Windows 2000, Windows XP, and Windows .NET Server.
Overview
Boot.ini is a hidden, read-only text file on the root of the system partition of a Microsoft Windows 2000, Windows XP, or Windows .NET Server machine. The boot loader menu is used on dual-boot and multiboot systems to select which operating system (Windows 2000 or some other operating system) to boot. The Boot.ini file creates this menu, which normally is only displayed if more than one operating system is installed on the machine.
Examples
A typical Boot.ini file for a default Windows 2000 installation might look like this:
[boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)\ WINNT [operating systems] multi(0)disk(0)rdisk(0)partition(1)\ WINNT="Microsoft Windows 2000 Professional" /fastdetect
You can see a close correspondence between the appearance of the Boot.ini file and the boot loader menu, which the Ntldr program creates during the Windows NT boot sequence.
A Boot.ini file for a dual-boot system configured to boot to either Windows 2000 or Windows 98 usually looks like this:
[boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)\ WINNT [operating systems] multi(0)disk(0)rdisk(0)partition(1)\ WINNT="Microsoft Windows 2000 Professional" /fastdetect C:\="Microsoft Windows"
The last line of the file is the same for booting to any MS-DOS-based operating system, including Windows 95, Windows 98, and Windows Millennium Edition (Me).
See Also boot ,boot files ,boot loader menu
A menu that appears when you boot a Microsoft Windows 2000, Windows XP, or Windows .NET Server computer configured for dual-boot or multiboot operation with other operating systems.
Overview
The boot loader menu appears during the boot loader phase of Windows NT startup, and it is displayed by the Windows 2000, Windows XP, and Windows .NET Server loader program called Ntldr. The boot loader menu allows you to select the particular operating system you want to run on a dual-boot or multiboot system and to use optional boot-time switches for booting Windows 2000, Windows XP, and Windows .NET Server in various enhanced ways or for troubleshooting purposes. The table summarizes some of the more commonly used boot-time switches used in Boot.ini.
Switch | Description |
/3GB | Used only with Windows 2000 Advanced Server to increase user address space from 2 gigabytes (GB) to 3 GB |
/basevideo | Starts Windows 2000 using generic Video Graphics Adapter (VGA) video |
/bootlog | Creates a log, called Ntbtlog.txt, of steps in the boot process |
/fastdetect | Skips enumeration of serial and parallel devices during the boot process (included by default) |
/numproc= | Specifies the number of CPUs to use on a symmetric multiprocessing (SMP) system |
/sos | Lists the device drivers marked to load at boot time and displays other information |
Notes
The boot loader menu is created by the Boot.ini file. This file can be edited using a text editor such as Notepad, but this should be done with care as mistakes could render your system unbootable.
See Also boot ,boot files ,Boot.ini
Stands for bootstrap protocol, a Transmission Control Protocol/Internet Protocol (TCP/IP) protocol and service that allows diskless workstations to obtain their IP address, other TCP/IP configuration information, and their boot image file from a bootstrap protocol (BOOTP) server.
See Also bootstrap protocol (BOOTP)
The partition of a disk on which Microsoft Windows 2000, Windows XP, or Windows .NET Server installs its core operating system files.
Overview
The core operating system files for Windows 2000, Windows XP, and Windows .NET Server are typically stored in \Winnt and its subdirectories. The \Winnt directory and its system files are located on what is referred to as the boot partition (by a strange choice of terminology, the boot files in Windows 2000, Windows XP, and Windows .NET Server are stored on the system partition).
The choice of which partition is to be the boot partition is made during installation of Windows 2000, Windows XP, and Windows .NET Server and cannot be changed afterward. An important consideration when installing Windows 2000, Windows XP, and Windows .NET Server is designating a boot partition that has sufficient free space to contain the various operating system files together with all the optional and future components such as device drivers.
Notes
The boot partition can be the same as or different from the system partition.
See Also boot process ,system partition
The series of steps that occurs when an operating system boots on a machine.
Overview
Each operating system has its own particular boot sequence and uses its own specific set of boot files. Knowledge of the boot sequence for a particular operating system can aid in troubleshooting problems booting a machine on which that operating system is installed. For example, from messages displayed during the boot process, a technician can often determine whether a particular boot file is missing or corrupt.
The following is a brief summary of the boot sequence for the Microsoft Windows 2000 operating system (the Windows XP and Windows .NET Server boot sequences are similar). Note that the actual boot process involves more than 100 different steps and that this description gives only an overview of the process.
Preboot: The boot process can take place only because during installation Windows 2000 Setup writes boot code (a short series of executable instructions) on the master boot record (MBR) located on the first sector of the first hard disk. The MBR also contains the partition table identifying which partition is the active (bootable) partition that contains the operating system boot files. Setup also creates a file called Boot.ini that is used to display a boot loader menu on systems configured for dual- booting or multibooting to Windows 2000 and other operating systems.
Ntldr: When a Windows 2000 system is powered on, the basic input/output system (BIOS) reads the MBR into memory and transfers control to the MBR, which then finds, loads, and executes Ntldr, a key Windows 2000 executable boot file. When Ntldr starts, the processor is still running in 16-bit real mode, and the first thing Ntldr does is switch the processor to 32-bit protected mode. Ntldr then creates page tables and enables paging. At this point, if the boot or system drive is on a Small Computer System Interface (SCSI) drive, Ntldr loads Ntbootdd.sys, which functions as a device driver for the drive. Once this stage is passed, Ntldr clears the screen and if the system is configured for multiboot operation, it then displays the boot loader menu generated using Boot.ini (this menu is not displayed if the only operating system installed is Windows 2000 itself). Assuming single-boot mode, Ntldr then locates the system directory (usually \Winnt), clears the screen again, displays the "Starting Windows" progress bar, and begins loading additional files including the kernel (Ntoskrnl.exe); and the hardware abstraction layer, or HAL (Hal.dll), reads the SYSTEM hive to determine which other device drivers to load, loads and initializes the file system and device drivers needed, and various other tasks. Then Ntldr calls Ntoskrnl.exe for the next stage of the boot process.
Ntoskrnl.exe: The operating system kernel Ntoskrnl.exe performs a two-phase initialization that consists of more than 30 different steps that are too involved to explain here. As these steps are performed, the Starting Windows progress bar moves toward 100 percent, at which time the Session Manager subsystem (Smss) is initialized.
Smss: The role of Smss is to create the user-mode environment that provides the graphical user interface (GUI) by which the user completes the boot process and accesses the system. Smss performs a whole series of steps ending in its main thread waiting for the Winlogon process to generate the logon dialog box.
Logon: Once the logon dialog box is generated, the user enters the necessary credentials, is authenticated, and the desktop user interface appears. The boot process is now complete.
See Also boot ,boot files
A boot file in Microsoft Windows 2000, Windows XP, and Windows .NET Server used to support dual-boot scenarios with MS-DOS-based operating systems such as Windows Millennium Edition (Me).
Overview
When the boot loader menu appears during the boot process on a dual-boot Windows 2000, Windows XP, or Windows .NET Server machine, the user selects the operating system to boot. If an MS-DOS-based operating system such as Windows 95, Windows 98, or Windows Me is selected, the Ntldr program immediately switches the processor back to 16-bit real mode and then loads Bootsect.dos and turns control of the boot process over to it. Bootsect.dos then continues with an MS-DOS-specific boot process leading to initialization of the selected operating system.
Bootsect.dos contains the location of the partition boot sector that existed on the partition prior to the installation of Windows 2000, Windows XP, or Windows .NET Server. Thus, Bootsect.dos enables the system to locate and load the alternate operating system. Bootsect.dos is not loaded during a normal boot of the Windows 2000, Windows XP, or Windows .NET Server operating system.
See Also boot files ,boot process
A Transmission Control Protocol/Internet Protocol (TCP/IP) protocol and service that allows diskless workstations to obtain their IP address, other TCP/IP configuration information, and their boot image file from a bootstrap protocol (BOOTP) server.
Overview
The network interface card (NIC) on these diskless workstations contains a programmable read-only memory (PROM) chip containing code necessary to initialize the client.
When a bootstrap protocol (BOOTP) client is started, it has no IP address, so it broadcasts a message containing its MAC address onto the network. This message is called a "BOOTP request," and it is picked up by the BOOTP server, which replies to the client with the following information that the client needs:
The client's IP address, subnet mask, and default gateway address
The IP address and host name of the BOOTP server
The IP address of the server that has the boot image, which the client needs to load its operating system
When the client receives this information from the BOOTP server, it configures and initializes its TCP/IP protocol stack, and then connects to the server on which the boot image is shared. The client loads the boot image and uses this information to load and start its operating system.
BOOTP is defined in RFCs 951 and 1084. The Dynamic Host Configuration Protocol (DHCP) was developed as an extension of BOOTP.
Notes
The term bootstrap protocol (or boot protocol ) comes from the idea of lifting yourself up by your own bootstraps-something that is obviously difficult to do. In other words, how does a client machine start up when it initially has neither an IP address nor an operating system? BOOTP makes this difficult task possible.
Most UNIX servers support diskless workstations using the BOOTP protocol. BOOTP is implemented on UNIX servers using the bootpd daemon. Certain aspects of BOOTP are supported by Microsoft Windows 2000, Windows XP, and Windows .NET Server, but the protocol is rarely used in Windows networks.
See Also Dynamic Host Configuration Protocol (DHCP)
In Microsoft Windows 2000, Windows XP, and Windows .NET Server, the volume that has the operating system files.
Overview
The boot volume can be the same as or different from the system volume, and it can be formatted in either NTFS file system (NTFS) or file allocation table (FAT). The term volume indicates that we are referring here to dynamic storage, which enables volumes to be created and managed. By contrast, basic storage enables the creation and management of partitions instead.
See Also boot partition
An exterior gateway protocol (EGP) used on the Internet to provide loop-free routing between different autonomous systems (ASs).
Overview
The Internet consists of large, independently administered networks called ASs connected by routers to form a single, enormous internetwork. ASs themselves are smaller internetworks and contain routers that exchange routing information with each other using various interior gateway protocols (IGPs) such as Routing Information Protocol (RIP) and Interior Gateway Routing Protocol (IGRP). These IGPs do not scale well enough to handle exchange of routing information between the border routers that join various ASs together, however, and for such purposes exterior gateway protocols (EGPs) are used, the de facto standard EGP for the Internet being the Border Gateway Protocol (BGP).
Like RIP and IGRP, BGP is based on the distance vector routing algorithm (or more specifically on a variant called path-vector), which enables groups of routers to share their routing information in a highly efficient and scalable manner. The routing information BGP exchanges between boundary routers is called Network Layer Reachability Information (NLRI), and specifies which other AS's data can be forwarded to from the local AS and the most efficient routes (best path) for doing this. BGP also can ensure against routing loops occurring.
BGP was developed in 1982 as the successor to EGP and was formalized in RFCs 827 and 904. Since then it has gone through several versions, with the current version being BGP 4, specified by RFC 1771. BGP 4 includes a number of enhancements over earlier versions, including support for
Route and path aggregation
Route, path, and community filtering
Routing policies
Advertising Internet Protocol (IP) prefixes
Classless Interdomain Routing (CIDR)
Architecture
BGP is a connection-oriented protocol that runs on top of Transmission Control Protocol (TCP) to provide reliable transport of routing updates. TCP port 179 is used for forming connections between BGP-enabled routers, and incremental updates to routing tables only are transmitted, which makes BGP efficient in terms of bandwidth utilization (other distance-vector routing protocols exchange entire routing tables at regular intervals, which makes them scale poorly to internetworks the size of the Internet).
To use BGP, your internetwork must first be assigned an Autonomous System Number (ASN). You can get one by contacting your regional Internet registry, such as the American Registry for Internet Numbers (ARIN) for North and South America, Reseaux IP Europ ens (RIPE) for Europe, or the Asian-Pacific Network Information Center (APNIC) for Asia. ASNs for public internetworks are assigned from the range 1 through 64511.
BGP-speaking routers within an AS establish peering relationships with each other to form a loop-free routing mesh. The first update between two peers includes all known routes on the network, while succeeding updates are incremental.
Implementation
BGP needs to be implemented only in very large internetworks. When smaller internetworks using IGRP grow to the point that IGRP performs poorly, BGP can be used to partition the internetwork into two autonomous systems for better routing performance.
Another situation where you might implement BGP is if your corporate internetwork is multihomed, that is, has several dedicated connections to the Internet using different Internet service providers (ISPs). In this case, you can use BGP to balance the load between the Internet connections and provide redundancy.
Finally, if your corporate internetwork is being used as a transit network to connect other networks to the Internet, you need to employ BGP.
If you plan to implement BGP, make sure your router is powerful enough to handle it, especially if your internetwork will be directly connected to a regional ISP's network.
Notes
There are actually two flavors of BGP, though this distinction is not widely used in the literature:
EBGP (Exterior BGP): The form used for communication between different ASs for BGP-enabled routers. This is also simply known as BGP and is the version described in this article.
IBGP (Interior BGP): The form used for communication within an AS for BGP-enabled routers.
See Also autonomous system (AS) ,exterior gateway protocol (EGP) ,routing protocol
A router that connects two different autonomous systems (ASs).
Overview
The Internet consists of a collection of thousands of different independently administered large internetworks called ASs. Border routers are high-speed backbone routers that connect these different internetworks.
Border router. Using a border router to connect two autonomous systems.
Border routers use the Border Gateway Protocol (BGP) as the routing protocol for exchanging route information between them. Since the routing tables for border routers are large and rapidly growing as the Internet itself expands and evolves, border routers need to be high-performance, with at least 64 kilobytes (KB) of memory to hold these routing tables. Without these border routers and BGP, the Internet would be limited to a much smaller size than it is.
See Also autonomous system (AS), Border Gateway Protocol (BGP), Internet, router
A situation that occurs when computer and network systems and components are unable to meet the demand placed upon them by real-world situations.
Overview
A bottleneck is essentially the particular network component or server subsystem that is causing the problem. For example, if users on a Microsoft Windows 2000-based network are complaining that it takes too long to log on when they arrive at the office in the morning, the bottleneck and its potential resolution might be
Not enough domain controllers to handle logon requests (A solution: add more domain controllers)
The domain controller does not have enough memory to process large numbers of simultaneous logons (A solution: add more random access memory [RAM])
Network bandwidth is saturated in the morning with directory replication traffic (A solution: reschedule directory replication or upgrade to 100 megabits per second (Mbps) Ethernet)
The etymological reason for describing each of the above situations as a "bottleneck" is that a bottle's thinnest point is its neck and hence the neck controls the flow of liquid should the bottle be inverted. In the same way, the performance of an application running on a computer system can be limited by the amount of physical memory, read/write speed of the disk subsystem, throughput of the network interface card, speed of the CPU, and other parameters-any of these components (or several of them) could be a bottleneck that prevents the application from performing as desired. Or more generally, the performance of a browser accessing Web content on a corporate Intranet could be affected by overworked name servers for Domain Name System (DNS) name resolution, an insufficient number of domain controllers to handle authentication requests, slow or faulty routers joining subnets within an internetwork, misconfigured firewalls, and a host of other issues that could represent bottlenecks.
Notes
Troubleshooting bottlenecks is the science (sometimes the art) of identifying, isolating, and correcting issues that limit application performance. Valuable tools for ferreting out bottlenecks in Windows 2000-, Windows XP-, and Windows .NET Server-based networks are the Performance console, one of the administrative tools in Windows 2000, Windows XP, and Windows .NET Server, and Task Manager. For system performance, there are four main types of bottlenecks:
Processor bottlenecks: If a CPU's utilization is constantly running near 100 percent when a certain application is running, it might indicate a processor bottleneck, in which case the application is said to be processor-bound. Upgrading to a faster processor or adding a second processor to a multiprocessor- capable motherboard might correct the problem.
Memory bottlenecks: These bottlenecks arise when the system has insufficient RAM, which generally results in excessive paging and overall poor performance. Adding more RAM is often the simplest and cheapest solution to improve performance of most computer systems.
Disk bottlenecks: Sometimes the hard disk subsystem cannot keep up with read/write requests generated by an application. In such a case the application is said to be disk-bound, and upgrading to a faster disk subsystem, implementing disk striping, or using a storage area network (SAN) can improve performance. Often, however, when disk activity is consistently too high, this simply indicates excessive paging caused by insufficient RAM. In this situation, what appears at first to be a disk bottleneck is actually one of memory instead.
Network bottleneck: With today's Gigabit Ethernet (GbE) networks, older servers simply cannot pipe data fast enough from their system bus into their GbE network cards to get it onto the network. What seems to be a network bottleneck here is really caused by the inadequate speed of the system bus, and upgrading the motherboard is the only real option. True network bottlenecks are more difficult to find and may result from misconfigured routers, network cards running in promiscuous mode, excessive broadcast overhead from using too many protocols on the network, poor planning of network topologies, and many other issues.
An effect that happens to signals on a bus topology network when the ends of the bus are improperly terminated or unterminated.
Overview
A signal that is placed on a bus that is unterminated will continue to reflect from the end of the bus until that signal is attenuated by the impedance of the cable. Another situation that can cause signals to bounce is a break in the cable, which essentially creates two unterminated ends for the two segments.
The effect of signal bounce on baseband networks such as Ethernet is serious, since the transceivers on the network interface cards (NICs) attached to the bus interpret the problem as a collision and stop transmitting. This collision occurs because the signal is colliding with its own reflection. Once the proper termination is applied to the bus, network communication can resume.
See Also terminator
Stands for bits per second, a unit used for measuring the speed of transmission of data on a network of computers.
See Also bits per second (bps)
A troubleshooting tool used to determine the wiring of an RS-232 interface on a networking device or computer.
Overview
A breakout box can be inserted between two RS-232 devices to determine which wires are active. Breakout boxes are useful in troubleshooting RS-232 connection problems resulting from a manufacturer's device not using standard pinning.
Breakout boxes are specific examples of a more general category of network testing equipment called "status monitors." Status monitors are available for testing a variety of serial interfaces, including RS-232, RS-449, V.35, and X.21. They generally come with a variety of connectors and are quick and easy to use for isolating problems with serial transmission connections in networking, telecommunications, and industrial settings.
See Also serial transmission
Stands for Binary Runtime Environment for Wireless, a platform from QUALCOMM for developing applications for cellular communications systems.
See Also Binary Runtime Environment for Wireless (BREW)
A networking component used either to extend or to segment networks.
Overview
Bridges work at the data-link layer of the Open Systems Interconnection (OSI) model of networking. They can be used to
Segment networks into smaller collision domains
Join dissimilar media such as unshielded twisted-pair (UTP) cabling and fiber-optic cabling
Join together different network architectures such as Token Ring and Ethernet (called a translation bridge)
Bridge. The three basic types of bridge.
Bridges regenerate signals but do not perform any protocol conversion, so the same networking protocol (such as Transmission Control Protocol/Internet Protocol [TCP/IP]) must be running on both network segments connected to the bridge. Bridges can also support Simple Network Management Protocol (SNMP), and they can have other diagnostic features.
Bridges come in three basic types:
Local bridges: Directly connect local area networks (LANs) (called a transparent bridge for Ethernet networks and a source-routed bridge for Token Ring networks)
Remote bridges: Can be used to create a wide area network (WAN) link between two LANs
Wireless bridges: Can be used to join LANs or connect remote stations to LANs without wiring between them
Architecture
Bridges operate by sensing the source MAC addresses of the transmitting nodes on the network and automatically building an internal routing table. This table is used to determine which connected segment to route packets to, and it provides the filtering capability that bridges are known for.
If the bridge knows which segment a packet is intended for, it forwards the packet directly to that segment. If the bridge does not recognize the packet's destination address, it forwards the packet to all connected segments except the one it originated on. And if the destination address is in the same segment as the source address, the bridge drops the packet.
Bridges also forward broadcast packets to all segments except the originating one.
Advantages and Disadvantages
Bridges are less expensive than routers and can easily be used to add more stations to a network. They are transparent to high-level protocols and can even be used with nonroutable protocols that routers cannot handle.
Bridges have the disadvantages, however, of increasing the chance of broadcast storms occurring on a network and are not as efficient in larger networks as routers are.
Implementation
Use bridges to reduce network congestion and improve performance by segmenting busy Ethernet networks into smaller collision domains. You can also use bridges to connect segments more efficiently than repeaters and to join dissimilar networks such as Ethernet and Token Ring. Remote bridges can be used to create WAN links.
A poorly placed bridge can actually worsen network performance. For example, if you use a bridge to divide users who belong to the same department and frequently communicate with one another over the network, this might actually slow down communication among users by creating a bottleneck. It is better to use bridges to join together separate departmental LANs on which intradepartmental traffic is greater than interdepartmental traffic.
When using bridges to connect networks, make sure that only one path leads to any destination node on the network; otherwise, frames could become locked in loops and circle the network endlessly, causing a network storm.
Notes
Switches and bridges function similarly, but although switches can have many ports, bridges only have two.
See Also remote bridge ,wireless networking
A server that acts as an endpoint of communications with another site.
Overview
In Microsoft terminology, bridgehead servers occur in several contexts. For example, in Microsoft Exchange Server, a bridgehead server in one site is responsible for routing messages through a connector to a similar server in a different site. More generally, in Microsoft Windows 2000 and Windows .NET Server, a bridgehead server is a domain controller that replicates Active Directory directory service information with domain controllers in other sites. The first domain controller in each site assumes the role of Inter-Site Topology Generator and determines which domain controllers in the site will be selected as bridgehead servers.
Stands for Basic Rate Interface ISDN, the slower version of Integrated Services Digital Network (ISDN) communications (the faster being Primary Rate Interface [PRI]-ISDN).
See Also Basic Rate Interface ISDN (BRI-ISDN)
A signaling technology that sends signals simultaneously over a range of different frequencies as electromagnetic waves. The opposite of baseband.
See Also broadband transmission
Generally refers to various technologies such as digital subscriber line (DSL) and cable modems that provide high-speed Internet access for residential and business customers.
Overview
The growth and evolution of the Internet and World Wide Web over the last 10 years has seen simple text-based Web pages become replaced with media-rich content that includes graphic files, sound clips, Shockwave animations, and streaming media. In addition text-based Simple Mail Transfer Protocol (SMTP) e-mail has become heavy with large attachments including Microsoft Word files, spreadsheets, images, and other content. These changes in content forms require high-bandwidth Internet connections, and traditional dial-up modem connections (even 56K) feel inadequate to many users.
As a result, the broadband Internet access market has taken off in the last couple of years, with widespread deployment of cable modem and DSL connections now in the millions. In addition, for remote locations, companies such as StarBand Communications and Digistar provide satellite-based broadband Internet access with download speeds in the 2-megabit-per-second (Mbps) range (for more on satellite-based broadband, see the article "broadband wireless communications" elsewhere in this chapter).
The two most commonly deployed broadband Internet access solutions are cable modems and variants of DSL. Cable modems are a low-cost solution that is easier to deploy than DSL, but they are generally only available in residential markets where the cabling infrastructure has already been widely deployed. DSL is a more complex solution offered by telcos but has the advantage that connections are dedicated rather than shared: a DSL connection offers guaranteed bandwidth, while the effective bandwidth for a cable modem connection depends on the number of users to which it is deployed in a given area (cable modem users are essentially connected in a LAN and so share the available bandwidth of the LAN).
Speed is the main benefit of various broadband Internet access technologies, and a comparison is useful:
Copper DSL: Running various flavors of DSL such as Asymmetric Digital Subscriber Line (ADSL) and Symmetric Digital Subscriber Line (SDSL) over the copper local loop to subscribers can offer speeds of up to 8 Mbps, but download speeds of 1 or 2 Mbps are more common (upload speeds may be less).
Fiber DSL: By running fiber to the curb, significantly higher DSL speeds of up to 60 Mbps or higher can be achieved, but the cost is high due to the need to deploy a new fiber infrastructure. This is an attractive solution for businesses, however, especially where telcos are rolling out such infrastructures.
Cable modem: Typical cable modem speeds are between 2 and 6 Mbps, but effective speeds may be much less for users due to the shared-bandwidth nature of this solution.
Uses
In addition to providing the ability to surf the Web at high speeds or send Christmas card images through e-mail, broadband Internet access is seen by increasing numbers of companies as an idea solution for supporting the remote workforce of home-based telecommuters. By using a cable modem or DSL connection and setting up a Virtual Private Network (VPN) connection using Microsoft Windows 2000, Windows XP, and Windows .NET Server, or some other platform, employees can work from home across secure connections to their company intranet.
Large companies that choose DSL or other broadband solutions as replacements for or backups to existing leased-line wide area network (WAN) links need to consider things such as service level agreements (SLAs), Quality of Service (QoS) guarantees (usually nonexistent for DSL), the number of Internet Protocol (IP) addresses that can be provided with the connection (usually under 150 for DSL), deployment times (usually weeks, but sometimes months), and business pricing (which is significantly more than residential pricing).
Advantages and Disadvantages
One important limitation of DSL as a broadband Internet access solution is that it is only viable within a small distance from the telco's central office (CO). This distance is typically about 18,000 feet (5500 meters) for the most popular implementation of DSL; that is, ADSL. Cable modem provisioning does not suffer from this distance limitation, but its deployment is limited to areas where the necessary cabling infrastructure is already present, which excludes most business and industrial parks.
Cable modems also have the additional advantage of being simpler to implement than DSL, which often requires professional installation services. On the other hand, DSL is intrinsically more secure than cable modems since DSL connections are dedicated-it is just your customer premises and the DSL provider on the network. With cable modems, all users in a given service area are on a shared LAN, and if your connection is not secured using a firewall, then other users in your neighborhood may be able to view and access shared files on your system.
Marketplace
Copper DSL is available from most telcos and carriers, including Sprint Corporation, Covad Communications Company, the various "baby Bells," and many others. Fiber DSL is being piloted by Pacific Bell Telephone Company and others.
Most cable companies provide cable modem access now, with AT&T being a major player in this market.
Prospects
While broadband Internet access services are becoming more and more widely deployed in the United States, the marketplace tends to be fractured, and solutions and equipment from one vendor often have interoperability issues with those from other vendors. This is especially the case with broadband wireless technologies.
One country that is taking a more aggressive approach to broadband is Japan. While the Japanese economy largely missed out on the narrowband Internet and PC revolution of the 1990s, the country is making strong efforts to become the world leader in implementing broadband Internet technologies, with companies such as Sony taking the lead.
See Also broadband transmission ,broadband wireless communications cable modem, Digital Subscriber Line (DSL), Internet access, xDSL
The broadband transmission counterpart of Integrated Services Digital Network (ISDN).
Overview
Broadband ISDN (B-ISDN) encompasses a set of International Telecommunication Union (ITU) standards and services designed to provide an integrated digital network for audio, video, and data transmission. Instead of using the copper media used in ordinary ISDN, broadband ISDN uses fiber-optic and radio media.
Broadband ISDN is designed to use the cell-switching transport technology of Asynchronous Transfer Mode (ATM) together with the underlying physical transport mechanisms of Synchronous Optical Network (SONET). Broadband ISDN standards and technologies were intended to provide high-speed digital connectivity for homes and businesses, but the technology was never widely deployed and has been superseded by Digital Subscriber Line (DSL) and other high-speed telco services.
See Also Digital Subscriber Line (DSL)
A signaling technology that sends signals simultaneously over a range of different frequencies as electromagnetic waves. The opposite of baseband transmission.
Overview
Broadband transmissions are divided into multiple bands or channels by multiplexers using a multiplexing scheme such as frequency-division multiplexing (FDM). Each channel has a carrier frequency that is modulated to carry the signal from a given source. At the receiving station, multiplexers separate the various signals. Guard bands are used to prevent interference among channels.
Broadband signals are unidirectional-traveling in only one direction at a time-so a broadband system can generally either transmit or receive but cannot do both simultaneously. Broadband signals can be regenerated using amplifiers in order to travel longer distances before becoming attenuated.
Uses
Broadband transmission is typically used for environments in which video, audio, and data need to be transmitted simultaneously. Cable television systems are based on broadband transmission technologies, as are satellite-based television services. Examples of broadband services in the computer networking arena include T-carrier services, Asynchronous Transfer Mode (ATM), and the various flavors of Digital Subscriber Line (DSL).
See Also Asynchronous Transfer Mode (ATM), baseband transmission, broadband Internet access, broadband wireless communications, Digital Subscriber Line (DSL), T-carrier
Generally refers to high-speed wireless communications systems where data rates are approximately 1 megabit per second (Mbps) or higher.
Overview
Broadband wireless (or wireless broadband) is an emerging high-speed communications technology that is being largely driven by the Internet access market. Broadband wireless systems achieve data rates comparable to Digital Subscriber Line (DSL) or cable modems and can be used in environments where these technologies are unavailable or difficult to deploy, such as isolated rural areas. And like DSL and similar technologies, broadband wireless is an always-on solution that provides fast access to the Internet and can be used in other corporate wide area network (WAN) scenarios as well.
Broadband wireless basically comes in three forms: fixed wireless, mobile wireless, and satellite-based.
Fixed broadband wireless is a technology that is gaining significant market share at all levels, from small businesses to the enterprise. In a typical fixed wireless scenario, a business requiring high-speed Internet access or a WAN connection deploys a broadband radio transmitter/receiver with a fixed unidirectional dish or horn antenna pointed toward the service provider's antenna. A clear line of sight is required between the customer premises antenna and the provider's antenna, which generally means customers deploy their antenna on their rooftop and providers deploy antennas on high towers, skyscrapers, or nearby mountains. Fixed wireless broadband can be based on various different technologies including Local Multipoint Distribution System (LMDS), Multichannel Multipoint Distribution System (MMDS), and others. Fixed broadband wireless communications systems are based on spread-spectrum communications technologies and may use frequencies from the Industrial, Scientific, and Medical (ISM) band's 2.5 GHz range up to millimeter wavelengths in the 66 gigahertz (GHz) range. Dedicated point-to-point microwave links can offer data transmission speeds of 10 Mbps or higher, but speeds of 1 or 2 Mbps are more common.
Mobile broadband wireless solutions are still in planning stages in most countries and regions, with Europe and Asia in the lead with planned rollouts of 3G cellular technologies such as Wideband Code Division Multiple Access (WCDMA) and Universal Mobile Telecommunication System (UMTS). Nevertheless, widespread deployment of these technologies probably will not happen until 2005 or later.
Mobile broadband services are also expected to provide significantly slower speeds than fixed solutions. For example a WCDMA system that provides 2 Mbps for fixed transmission can only support 384 Kbps for mobile (walking) transmission when handoffs are required, and may go as low as 144 Kbps for highway travel.
Satellite-based broadband wireless solutions generally offer speeds of around 2 Mbps, are easy to deploy, and are rapidly becoming more widely available. An in- depth discussion of how this technology works can be found in the article "satellite networking" elsewhere in this book.
Uses
Companies may implement broadband wireless in a variety of scenarios:
Fixed broadband wireless is often used for providing high-speed Internet access, for streaming video broadcasting from remote locations, and for backup links to leased-lines used for WAN links between branch offices.
Mobile broadband wireless, when deployed, will probably be used for high-speed Internet access for cell phones, Personal Digital Assistants (PDAs), and other hand-held information appliances.
Satellite-based broadband wireless is primarily intended to replace enterprise WAN links and for providing high-speed Internet access in remote locations.
Advantages and Disadvantages
A primary advantage of broadband wireless over competing wired broadband technologies such as DSL or cable modems is their ease of setup and the speed at which they can be deployed. Industry reports indicate that DSL services sometimes take weeks to set up, but fixed broadband wireless solutions typically take only a day or two. In the rapidly evolving Internet economy where time-to-market is critical for new startups, deployment speed is a factor that has influenced many new companies in adopting broadband wireless solutions. In addition, many large companies are turning to broadband wireless to replace or provide backup for expensive leased lines such as T1 or E1 at a fraction of the cost of these lines. Some broadband wireless carriers are also looking at providing value-added services such as Voice over IP (VoIP) in the near future as part of their integrated package of services. Broadband wireless systems are also relatively secure because most are based on spread-spectrum wireless communications technologies, which means that signals are scrambled across a large number of frequencies, making it difficult to eavesdrop (a firewall is nevertheless recommended when implementing broadband wireless as this is an always-on solution). Finally, broadband wireless is often the only solution for customers in remote areas requiring broadband Internet access or WAN links.
Besides the line-of-site limitation, broadband wireless does have other disadvantages that need to be considered before deployment. High-frequency broadband wireless platforms such as LMDS are more easily influenced by environmental factors such as weather than systems that use the low-frequency ISM or other low- frequency bands, and that can be a consideration in certain locations. Satellite-based broadband services have a latency on the order of several hundred milliseconds (compared with under 20 msec for most wired land- based systems), which is fine for corporate data transmission but annoying to users for Web browsing.
Marketplace
In the fixed wireless broadband marketplace, many carriers and service providers are starting to provision broadband wireless for business and enterprise customers. Sprint Broadband Direct provisions 2 Mbps MMDS services, typically in a matter of days. MCI WorldCom is also making significant inroads into the MMDS market. Players in the higher-frequency LMDS market include Teligent, NextLink Communications, WinStar Communications, and others. AT&T is, of course, also a major player in the fixed wireless broadband market.
In the mobile wireless broadband market, the emerging players are currently Ericsson and Nokia, with their pre-third generation (3G) broadband cellular initiatives known as 2.5G.
In the satellite-based broadband wireless market, major players include DirecPC and StarBand Communications, both of which offer nationwide coverage. Tachyon also provides 2 Mbps service across the United States.
Notes
The Institute of Electrical and Electronics Engineers (IEEE) is standardizing fixed broadband wireless technologies under the new 802.16 group of standards.
See Also 802.16, broadband transmission, Digital Subscriber Line (DSL), Internet access, Local Multipoint Distribution Service (LMDS), Multipoint Multichannel Distribution Service (MMDS)
The collection of all stations on a network that can receive broadcast messages from any station among them.
Overview
Broadcast domains and collision domains are two different things:
Broadcast domains: These are defined by broadcasting only as all those stations that can receive a broadcast.
Collision domains: These are defined by any type of transmission, including unicasting, multicasting, and broadcasting.
Examples of broadcast domains include
All stations connected to a given group of hubs or switches
All stations on an internetwork whose routers are configured to forward broadcasts (not a desirable configuration)
All stations in a given virtual local area network (VLAN) configured on a group of Ethernet switches.
Notes
Bridges used to segment Ethernet networks divide collision domains but do not divide broadcast domains.
See Also collision domain
In Ethernet networks, a frame broadcast to every station on the network.
Overview
An Ethernet media access control (MAC)-layer broadcast frame has a hexadecimal MAC address of FF-FF- FF-FF-FF-FF. This hexadecimal address is equivalent to 48 binary "ones." The meaning of this address in Ethernet is simply that this frame is intended to be received and processed by every connected node on the network.
Broadcast frames are typically generated when network services make announcements of their presence and availability to other hosts on the network. Too many broadcast frames on a network can degrade communication between nodes on the network.
Notes
In routed internetworks, routers are usually configured not to forward broadcast frames to other subnets. The reason is to prevent broadcast storms in one subnet from overwhelming hosts in other connected subnets. As a result of this limitation, however, broadcast frames used as service announcements are usually limited in scope to the local subnet on which the host providing the services is located.
See Also broadcasting ,broadcast packet ,broadcast storm directed frame, frame
A network communications method in which a packet or frame is sent simultaneously to all stations on the network.
Overview
Broadcasts take place when broadcast frames (or packets) are sent out over the network. These frames contain a special address that instructs every station on the network to accept and process the frame's contents.
Broadcasts have various functions on a network, including
Announcing the availability of network services
Resolving host names into addresses
Troubleshooting and testing network connectivity
Examples of Internet Protocol (IP) services that employ broadcasts include
Address Resolution Protocol (ARP)
Dynamic Host Configuration Protocol (DHCP)
Domain Name System (DNS)
NETBIOS
Broadcasts are usually not an efficient use of network bandwidth, since only one or a few network stations might actually be interested in the information being broadcast. For this reason, directed frames (or packets) are used for most network communication, which involves targeting a packet directly for the intended station. (All other stations ignore the directed packet.) Another alternative is multicasting, which involves a form of limited broadcast to a select group of hosts.
Notes
Certain network conditions, such as certain types of device failure, can generate large numbers of unwanted broadcasts. These broadcast storms can sometimes bring down a network if the condition is not resolved.
Applications that are poorly designed may sometimes employ unnecessary amounts of broadcasting, with resulting degradation of overall network services.
See Also broadcast frame ,broadcast packet multicasting, unicasting
In Internet Protocol (IP) networks, an IP packet broadcast to every host on the network.
Overview
Broadcasts can be used in any type of IP network, including class A, B, C, D, and E networks. The actual broadcast address depends on the class of network under consideration. For example:
For a class A network 27.0.0.0 the address for a broadcast packet would be 27.255.255.255.
For a class B network 139.65.0.0 the broadcast address is 139.65.255.255.
For a class C network 207.17.125.0 the broadcast address is 207.17.125.255.
The general broadcast address 255.255.255.255 is called a local area network (LAN) broadcast and can be routed to every host on an internetwork if routers are allowed to forward broadcasts. A faulty device that produces excessive 255.255.255.255 packets is said to be "flooding" the internetwork with broadcasts, and this can lead to a condition called a "broadcast storm."
The common denominator in these examples is 255, which is the decimal representation of the binary octet 11111111. Thus, the LAN broadcast address 255.255.255.255 in binary notation is a series of 32 binary "ones."
See Also broadcasting ,broadcast frame ,broadcast storm directed packet, packet
A network condition in which so many broadcasts are occurring that normal communication between hosts is disrupted.
Overview
Broadcast storms commonly occur on Ethernet networks where baseband transmission technologies allow only one station to transmit at a time. The presence of broadcast storms often indicates that a networking component is malfunctioning and is continually sending out broadcast messages. A typical situation might be a failed transceiver on a network interface card (NIC) that is continually sending out a stream of binary "ones."
During a broadcast storm, the wire is continually busy and no other station is able to transmit information over the network. As a result, a broadcast storm essentially brings down the network. Since routers often are not configured to forward broadcast frames between subnets, broadcast storms usually are confined to a single subnet (configuring routers to forward broadcasts is thus a bad idea as a broadcast storm in one subnet could bring down the entire internetwork).
Broadcast storms might also indicate that your network's bandwidth is nearly saturated and needs to be upgraded.
See Also broadcasting
Any network device having the capabilities of both a bridge and a router.
Overview
Usually, a brouter acts as a router for one protocol (for example, Transmission Control Protocol/Internet Protocol [TCP/IP]) and a bridge for all other protocols (for example, Internetwork Packet Exchange/Sequenced Packet Exchange [IPX/SPX]). Network services often send their announcements over every protocol on the network, which generates additional traffic and makes it generally disadvantageous to run more than one protocol on a single network.
Brouters are not common anymore, however, and the solution adopted by most network designers nowadays is to use a single protocol for all network communication on the main portion of the network, with gateways connecting to segments running other protocols. The protocol of choice for most internetworking today is TCP/IP.
See Also bridge ,router
The list of available shared network resources on a Microsoft Windows network.
Overview
The browse list is maintained and distributed by the Computer Browser service. The browse list contains a list of all available domains, workgroups, and servers on the network. This list is then distributed to clients who desire to connect to shared resources on the network so that they can locate and connect to these resources.
Essentially, when you are browsing Network Neighborhood in Windows NT or My Network Places in Windows 2000, Windows XP, or Windows .NET Server, you are looking at a representation of the browse list for your locally accessible network.
Notes
The browse list is maintained by the master browser computer, but clients that need it obtain it from backup browsers on the network.
If a server or domain is not heard from by the master browser after three announcement periods (amounting to approximately 45 minutes), the server or domain is removed from the browse list.
See Also Computer Browser service ,election
Any Microsoft Windows machine that is running the Computer Browser service and participates in updating and maintaining the browse list of shared resources available on the network.
See Also Computer Browser service
A client application that supports Hypertext Transfer Protocol (HTTP), the language of the World Wide Web.
See Also Hypertext Transfer Protocol (HTTP) ,Web browser
Generally, the process of exploring the shared resources available on a network or the Web content available on the Internet.
Overview
You can browse for shared resources on a Microsoft Windows network using Windows Explorer, My Network Places, and other tools. Browsing a Windows network is made possible by the Computer Browser service, which keeps track of all shared resources on a Windows NT network and communicates this information to clients when they need to access a resource. The Computer Browser service is at the core of the ability to locate shared file and printer resources on a network and maintains the browse list, the list of available shared resources.
Regarding the Internet, the term browsing refers to the process of using a Web browser such as Microsoft Internet Explorer, Netscape Navigator, or Opera Software's Opera to view and download Web pages from the Internet. The origin of the term probably stems from the idea of reading magazines, in which you pick up one magazine and skim through its contents, then go to another magazine, and so on. On the Internet, it is even easier. You do not have to "pick up" anything; you simply keep clicking the links.
See Also Computer Browser service ,Web browser
Stands for Berkeley Software Distribution, a family of UNIX operating systems.
Overview
BSD UNIX was developed in the 1970s at the University of California at Berkeley, which licensed the UNIX operating system from AT&T and then made a number of modifications and enhancements, including many common UNIX features such as the vi editor, the C shell, and Transmission Control Protocol/Internet Protocol (TCP/IP) networking.
BSD UNIX and its offshoots constitute one of the two most popular families of UNIX in use today, the other family being UNIX System V and its offshoots. BSD UNIX formed the basis of the SunOS from Sun Microsystems, but Sun later combined features of both BSD and System V into their popular Solaris operating system. BSD UNIX is older than Linux but has not attracted as much attention as Linux has lately.
The major flavors of BSD UNIX popular today include
FreeBSD: A free version of BSD UNIX available for the Intel x86, DEC Alpha, and PC-98 architectures. FreeBSD is the most popular of the BSDs and has a large and active developer community. FreeBSD has been popular with many Internet service providers (ISPs) as the base platform for their Web and mail servers. The current release of FreeBSD is version 4.3.
OpenBSD: A popular version that stresses security with integrated cryptography and support for SSH1 and SSH2. The current release of this operating system is OpenBSD 2.9, and it is also available for free.
NetBSD: Another free version of BSD UNIX that has been incorporated as the base operating system of a number of commercial products. The current release is NetBSD 1.5.1.
Notes
The commercial version BSDi is now known as iXsystems and is licensed by Wind River Systems.
For More Information
For a general overview of BSD flavors, see www.bsd.orgFreeBSD can be found at www.freebsd.orgOpenBSD can be downloaded from www.openbsd.orgNetBSD can be found at www.netbsd.org
See Also UNIX
Stands for business service provider, an application service provider (ASP) that offers a wide range of online business services that include not just Web hosting and e-commerce services typical of ASPs but also customer relations management, desktop maintenance support, system integration and consulting services, and other value-added business services.
See Also application service provider (ASP) ,xSP
A component of Microsoft Corporation's .NET platform that provides core Extensible Markup Language (XML) Web services.
Overview
Building-block services provide consistency and ease of use across services and applications developed for the .NET platform. These services are used to move the control of data from applications to the users who use these applications and ensure that user content forms the basis of all transactions.
Microsoft is developing a number of different building-block services to empower developers for rapid development of .NET Web services. Examples of these include services for
User identification (for example, Microsoft Passport)
User preference management
Message delivery
Calendar management
File storage
While Microsoft is developing the core set of .NET services, third-party partners will develop additional services to build in enhanced functionality to .NET applications and services.
See Also .NET platform
A telecommunications carrier focused on the Multitenant Unit (MTU) market.
Overview
With the increasing deregulation of the U.S. telecommunications industry over the last decades, several different types of local exchange carriers (LECs) have emerged in the marketplace, including Incumbent Local Exchange Carriers (ILECs) and Competitive Local Exchange Carriers (CLECs). The latest of these is the Building-centric Local Exchange Carrier (BLEC), which represents a carrier focused on providing broadband telco services within multitenant units (MTUs). An MTU is essentially a building or group of buildings that primarily host small and medium-sized businesses with between 10 and 200 employees. Examples of business environments serviced by BLECs include office skyscrapers, industrial parks, and hotels. Some BLECs also target residential apartment blocks and malls as well. By targeting MTUs, BLECs are essentially focusing on a market that ILECs have generally neglected (ILECs have historically focused on the large-enterprise and individual consumer markets instead). The requirements of BLEC clients are usually diverse, and typically include Internet Protocol (IP) data, Web hosting, e-mail, and Internet access, which BLECs offer as value-added data services to traditional voice telephone connectivity.
BLECs can typically be grouped into two categories:
Those focused on retail services to end-user business clients.
Those focused on the wholesale end of purchasing broadband access for MTUs from inter-exchange carriers (IXCs) who provision these wholesale services. Note that some IXCs themselves are getting into the MTU market by deploying high-speed metropolitan area networks (MANs) to service such customers and are in effect competitors to BLECs.
Implementation
Typically a single business client within an MTU cannot justify the cost of having a leased line such as T1 deployed to service its needs. That is where BLECs come in, however-they provision such services for all clients within a given MTU.
Building-centric Local Exchange Carrier (BLEC). How a BLEC provisions customers with broadband services.
Typically, a BLEC first has to provide new fiber to an MTU to provide clients with high-speed services brokered from larger LECs and IXCs. This first step is necessary because the majority of large office buildings in the United States do not currently have fiber-optic cabling deployed to them. Once fiber has been laid by the BLEC from the building to the central office (CO) of the LEC or IXC from which the BLEC obtains wholesale broadband provisioning, the BLEC then purchases T1 or T3 services from the LEC or IXC to run over the fiber. Switching gear (usually a DSLAM, an Asynchronous Transfer Mode [ATM] access switch, or some form of high-speed Ethernet switch) is then deployed by the BLEC in the basement of the MTU to provide broadband services to clients throughout the building. This arrangement is preferable to co-locating such equipment at LECs and IXCs and often give BLECs a competitive edge in the speed at which new services can be deployed and problems troubleshot.
Another technology option for BLECs is fixed broadband wireless, which bypasses the initial step of laying fiber to the building. This is often a method for cost- effective provisioning of broadband services for MTUs that is easy to implement rapidly and is often the only solution when the MTU is too far from a central office (CO) for DSL or T-carrier services to be effective.
To provision either of these scenarios, BLECs first have to negotiate right-of-way through revenue-sharing agreements with building owners to gain access to basement wiring closets or deploy rooftop antennas, and this is usually factored into the price for services offered by BLECs to tenants.
Marketplace
Some of the major players among BLECs include Broadband Office, which has right-of-way to a large portion of U.S. commercial office space; Comactive, which is an offshoot of Intermedia Communications; and many others.
Prospects
With increasing deregulation of the telecommunications industries, BLECs find themselves squeezed by rising customer expectations on the one hand, high levees from building owners for fiber and rooftop right-of-way on another hand, and direct competition from CLECs, ILECs, and IXCs higher up on the carrier feeding chain. Customers owning multiple MTUs desire simultaneous rollout regardless of the up-front costs to BLECs for servicing smaller premises. Some building owners (usually real estate companies) are also consider deploying their own broadband switching gear instead of partnering with BLECs to do so and thus bypass BLECs entirely by going to LECs and IXCs directly. Future rulings of the Federal Communications Commission (FCC) might also affect how this all works out in the marketplace.
Notes
Another common name for BLECs is Multitenant Broadband Service Providers (MBSPs).
See Also broadband Internet access ,broadband wireless communications carrier, inter-exchange carrier (IXC), local exchange carrier (LEC), multitenant unit (MTU)
In Microsoft Windows 2000, Windows XP, and Windows .NET Server, a type of user account that is created during installation.
Overview
All computers running Windows 2000, Windows XP, and Windows .NET Server, have two built-in user accounts:
Administrator account: Used to provide administrative access to all features of the operating system
Guest account: Intended to provide occasional users with access to network resources
Depending on whether the computer is a domain controller, a member server, or a workstation, built-in accounts will be either local user accounts or global user accounts. A built-in account on a domain controller is a global user account that exists everywhere within the domain. Users can log on to any machine in the domain using such an account, which provides administrators with the capability of administering a Windows 2000-based network from anywhere on the network. On a member server or workstation, the Administrator and Guest accounts are local user accounts and exist only on those machines.
Notes
Rename the Administrator built-in user account to make it more secure.
See Also built-in group
In Microsoft Windows 2000, Windows XP, and Windows .NET Server, a domain local group created during installation that has preassigned rights and permissions. Built-in local groups are used to simplify the administrative task of assigning users and groups rights to perform system tasks and permissions to access network resources. Some of these groups include
Users: Contains the Domain Users global group and is used to assign rights and permissions to all ordinary users.
Administrators: Contains the Domain Admins global group and the Administrator account created during setup.
Guests: Contains the Domain Guests global group.
Power Users: Members have the right to share folders and printers.
Backup Operators: Members have the right to back up and restore servers.
Account Operators: Members have the right to administer accounts.
Server Operators: Members have the right to administer servers.
Print Operators: Members have the right to administer printers.
See Also built-in global group
A type of global group created during installation of Active Directory directory service.
Overview
Built-in global groups are created in order to organize common groups of users for administrative purposes. These built-in global groups are created within either Active Directory (when implemented) or in the Security Accounts Manager (SAM) database (for stand-alone servers). The four types of built-in global groups are
Domain Admins: Initially, this group contains only the Administrator account that was created during setup. Only people with administrative responsibilities should be assigned to this group.
Domain Guests: This group contains the Guest account and is designed for organizing temporary users of network resources and granting them access.
Domain Users: When a new user account is created, it is automatically added to this group, whose function is to collect all ordinary users for the purpose of assigning them permissions to resources on the network.
Enterprise Admins: This group contains users who are assigned administrative rights over the entire network. The Enterprise Admins global group should be added to the Administrators domain local group in each of your network's domains. By default, the Administrator account is a member of the Enterprise Admins group.
See Also built-in group ,built-in domain local group
In Microsoft Windows 2000 and Windows .NET Server, a type of group created during installation to simplify the delegation and assignment of common administrative tasks.
Overview
Built-in groups have preassigned sets of user rights, and some also have preassigned members.
Windows 2000 and Windows .NET Server contain three kinds of built-in groups:
Built-in domain local groups: These are used to assign predefined sets of rights and permissions to users and groups of users, and they exist on all computers running Windows 2000 and Windows .NET Server.
Built-in global groups: These groups are used to automatically organize users into common groups for administrative purposes, and they exist only on Windows 2000 and Windows .NET Server domain controllers.
Built-in identities: These are used by the operating system to automatically group users for system purposes, and they exist on all computers running Windows 2000 and Windows .NET Server.
Notes
You cannot rename or delete a built-in group, and you cannot change the membership of a built-in identity.
See Also built-in global group ,built-in domain local group
In Microsoft Windows 2000, Windows XP, and Windows .NET Server, a term used to refer to what were known in Windows NT as system groups.
Overview
Built-in identities can represent different subsets of users in different situations, and they do not have a specific membership that administrators can modify. However, you can assign built-in identities rights and permissions for accessing resources or performing system tasks. Examples of built-in identities include
Everyone: Represents all users who can be, or are, on the network, whether from trusted or distrusted domains.
Network: Represents all users who can access, or are accessing, network resources over the network. It does not include users logged on locally to a machine and accessing those resources locally.
Interactive: Represents all users who can be, or are, currently logged on locally to a computer to access local resources on it. It does not include users who can access, or are accessing, network resources over the network.
See Also built-in group
A condition in which network activity rises suddenly for a short period of time.
Overview
A burst is a transient elevation in network activity, and a network on which a lot of bursts occur is said to be bursty. Bursty networks have different bandwidth requirements than networks on which the traffic is steady, and they need to be designed accordingly. For example, a network on which large video files are frequently transmitted tends to be bursty in its traffic flow.
Bursts can be indicative of a sudden increase in demand for network resources, or they can indicate hardware or software problems. Some networking components are capable of briefly sending data at speeds greater than normal transmission speeds; this is referred to as "operating in burst mode."
A good first step in accommodating bursty conditions is to use Ethernet switches instead of hubs for concentrating your network connections.
A linear circuit path that can be used to connect multiple devices for exchange of data.
Overview
The idea of a bus in computer networking technology is analogous to that of a bus as a means of transportation: a bus travels over a fixed route across a city, carrying people and stopping at various points for people to get on or off. In the same way, computers and networks use buses to transport data from one device to another. The point on a bus where a device can be connected is generally called a slot.
Buses generally fall in three categories: system buses, peripheral buses, and network buses (or bus topology networks).
System buses are internal to computer systems and are used to carry data between the processor, chipset, memory, disk subsystem, video subsystem, and peripheral cards such as network adapters and sound cards. Examples of different types of system buses include
Processor bus: This transports data between the CPU (central processing unit) and the chipset.
Memory bus: This transport data between the memory subsystem, CPU, and chipset.
I/O bus: This transports data between the CPU, chipset, memory subsystem, and internally attached peripherals such as network adapters, video adapters, and disk controllers.
Cache bus: This transports data between the CPU and the L2 cache (present only in sixth-generation processors such as the Pentium III).
When the term bus is used in conjunction with computer systems, it is commonly interpreted as meaning input/output (I/O) bus. The I/O bus has gone through many changes over the years, including the following:
Industry Standard Architecture (ISA) bus: The 8-bit ISA bus was developed by IBM in 1981 for the original IBM PC. A 16-bit version was then developed in 1984 for the newer IBM AT. Some desktop systems still include an ISA bus and slots for backward compatibility of legacy peripheral devices, but the presence of an ISA bus is problematic because it does not support plug and play (PnP).
VESA Local Bus (VLB): This was used by some 486 systems but had the disadvantage that the bus was essentially an extension of the CPU's leads, which resulted in poor performance.
Peripheral Component Interconnect (PCI) bus: This is the most common form of I/O bus in use today, and it comes in both 32-bit (PCI 2.0) and 64-bit (PCI 2.1) versions.
Peripheral buses are buses whose primary use is for connecting peripherals to computer systems or network switches. Examples of this type include Small Computer System Interface (SCSI) and Fibre Channel.
Network buses (or bus topology networks) represent any form of network in which devices are connected together in linear fashion. Examples include 10Base2 and 10Base5 Ethernet and Token Bus networks, all three of which are obsolete. Most networks today are based on a star topology, which is easier to manage than bus topology because of its centralized nature.
Prospects
The state of system bus technology is currently in flux. Whereas previously networks could not keep up with their servers, now the server has become the bottleneck: a Peripheral Component Interface (PCI) local bus has a difficult time performing I/O fast enough to fully utilize a Gigabit Ethernet (GbE) network connection. The result has been various industry initiatives to speed up the I/O bus to match rapidly growing network capacity (10 GbE is now on the horizon). Another source of pressure has been the increasing need for modern servers to be able to rapidly access large amounts of database storage, sometimes in the terabyte range.
Some of the newer industry initiatives for evolving system buses include
PCI-X (or PCIx) bus: This proposed next-generation PCI bus will have a theoretical data transfer rate of 1 gigabit per second (Gbps), based on a clock speed of 133 megahertz (MHz), and is backward-compatible with existing PCI peripherals. A draft standard for PCIx was produced in 1999.
Infiniband: Unlike legacy bus systems (including PCI), which are shared-bus systems in which connected devices must contend with each other for the right to transmit data, Infiniband is a switched-bus fabric that is capable of data transfer rates of 6 Gbps or higher and is supported by industry heavyweights such as IBM and Intel Corporation.
Ethernet: Since high-speed switched Ethernet performs so well in the network, why not use it for I/O within computer systems? This is the thinking of Performance Technologies, which has joined with other manufacturers in proposing a new form of PCI bus called cPCI based on switched Ethernet technologies that provides 2 Gbps of dedicated bandwidth per slot.
Other proposals include using high-speed SCSI technologies (such as Ultra160 SCSI) and FiberChannel for internal system buses, but these initiatives have not gained much momentum.
Notes
A bus and a port are both similar in that they transport data between devices, but although a port can be used only to connect two devices, a bus can connect three or more devices.
See Also 10Base2 ,10Base5 ,Fibre Channel ,Infiniband (IB) ,Small Computer System Interface (SCSI)
That portion of an application that reflects the actual way the enterprise does business.
Overview
Business logic is a term used in writing applications for Microsoft Transaction Server (MTS) using reusable COM+ components. These components represent a combination of logon verifications, policies, database lookups, validation edits, and other processes that constitute how business is done in the enterprise. An application's business logic specifies how the component's programming logic reflects the actual way the enterprise does business. Business logic enables consistent and logical processing of business data.
A representation of a real-world component of the enterprise's business is called a "business object." Examples of business objects include customers, orders, products, invoices, and anything else that can be encapsulated in an application's business logic and manipulated by its users.
Also known as B2B, e-commerce between different companies that have a partnering arrangement.
See Also B2B
Also known as B2C, a relationship in which individuals or companies purchase the services of another company.
See Also B2B
A networking topology that connects networking components along a single cable or that uses a series of cable segments that are connected linearly.
Overview
A network that uses a bus topology is referred to as a "bus network." Bus networks were the original form of Ethernet networks, using the 10Base5 cabling standard. Bus topology is used for
Small workgroup local area networks (LANs) whose computers are connected using a thinnet cable
Trunk cables connecting hubs or switches of departmental LANs to form a larger LAN
Backboning, by joining switches and routers to form campus-wide networks
Bus topology. A simple example of a bus topology network.
Bus topology is the cheapest way of connecting computers to form a workgroup or departmental LAN, but it has the disadvantage that a single loose connection or cable break can bring down the entire LAN.
Notes
A hub or concentrator on an Ethernet network is really a collapsed bus topology. Physically, the network appears to be wired in a star topology, but internally the hub contains a collapsed bus, creating a configuration called a star-wired bus. However, in this case, a failure in one of the cables does not affect the remaining network.
Communication problems on bus networks might indicate that the bus ends are improperly terminated. A break in the cable will produce a similar result, since the ends of the break are not terminated. Use a cable tester to determine the problem's nature and location.
See Also mesh topology ,ring topology ,star topology