J

C++

The most widely used object-oriented programming language.

Overview

C++ is the standard programming language used for developing tools and applications for high-speed networking. This is because it is a compiled language whose object code is essentially native assembly language and hence runs extremely fast. For example, a form handler written for a Hypertext Markup Language (HTML) form that runs on a UNIX Apache Web server will run much faster if it is written in a compiled language such as C or C++ than if it is written in an interpretive language such as Perl or Microsoft Visual Basic, Scripting Edition (VBScript).

High-performance Internet Server API (ISAPI) applications and dynamic-link libraries (DLLs) written for Microsoft Internet Information Services (IIS) generally perform best when written in C++. Powerful distributed Web-based applications for the Internet can be developed using a combination of Active Server Pages (ASP) scripts in VBScript or JScript, with Microsoft ActiveX components and ISAPI dynamic-link libraries (DLLs) written in C++ using Microsoft Visual C++.

C++ programs for Windows network operating system platforms can be developed using a variety of tools:

  • Traditional C++ development tools using editors, compilers, and debuggers support low-level application programming interface (API) access, Microsoft Foundation Classes (MFC), software development kits (SDKs), and other supporting elements.

  • Rapid application development (RAD) tools provide integrated development environments (IDEs) that focus on providing developers with ease-of-use features.

  • Component deployment tools take a component- based approach to generating and reusing C++ code for building distributed and multitier applications.

C++ is based on the earlier C language that is used for developing applications, including Win32 applications for Microsoft Windows platforms. The standard form of C++ is called ANSI C++ and is defined by the American National Standards Institute (ANSI).

Notes

Microsoft Visual C++ combines the best features of these various classes of tools. It is an excellent choice for developing large-scale distributed networking applications based on the C++ language and Microsoft Corporation's own specific extensions to ANSI C++ that are designed for the Win32 platform.

See Also C#

C#

Pronounced "C sharp," a programming language developed by Microsoft Corporation for its new .NET platform.

Overview

C# is an offshoot of C and C++ that is designed for rapid development of Web services for Microsoft's new .NET platform. C# is derived from C++ and has much of the power of C++ while improving on it in many respects from the point of view of the developer who needs to rapidly create and deploy applications in the e-economy.

The main weaknesses of C++ as a development environment are its complicated code-compile-debug development cycle, its potential of creating memory leaks that are difficult to troubleshoot, and the requirement of having applications explicitly manage memory resources. C# is similar to the Java platform developed by Sun Microsystems in that memory resources and garbage collection (object lifetime management) are automatically handled by the language itself, freeing developers to work on creating applications instead of being bothered by handling these intricate details. C# also simplifies access to external objects and simplifies the object creation process compared with C++. And although C++ applications require frequent use of include files to allow access to system services, in C# these services are transparently wrapped in objects. Like Java, C# thus relieves programmers of much of the chore of object and memory management, speeding up the development cycle in the process.

On the other hand, C# is unlike Java in that it maintains powerful features such as pointers, passing arguments through reference, overloading operators, and manually allocating memory. These features, basic to C++, are included in C# to provide programmers with the functionality should they need it, but they are deemphasized in C# compared to their common use in C++. For example, when pointers are used in C#, they need to be tagged in a section of code marked as "unsafe," making it easier to troubleshoot difficulties that may arise from their misapplication. Furthermore, C# has the advantage over Java of providing direct access to native Microsoft Windows services, and C# is easier to learn than Java for C++ programmers because its syntax is derived from and is similar to C++, whereas the syntax for Java has many differences from C++ that make it difficult for C++ programmers to use easily.

It is relatively simple to port existing C++ programs to C# (by contrast, it is much more difficult to port such applications to Java). The main disadvantage of C# as a development environment is a weakness shared with Java: unlike C++, which compiles programs into native machine code, C# compiles programs into an intermediate bytecode called intermediate language (IL) that is then interpreted by the .NET runtime. This means C# shares a performance hit similar to Java, which is also an interpreted platform. C++ will still be used for writing code modules where the best performance possible is required (such as device drivers), but C# performs sufficiently well on today's hardware platforms to be used as a primarily development platform. And because C# executes on the .NET runtime, it shares the interoperability features of this runtime, which allows modules written in C# to communicate with code written using other programming languages.

Microsoft plans to submit the C# language to the standards board of the European Computer Manufacturers Association (ECMA). The ECMA will then manage the language as a standard, which means that third parties wanting to use C# to develop applications will not be required to pay licensing fees to Microsoft. This will keep the cost of development tools and applications development low.

Notes

The Object Management Group (OMG), the creators of Common Object Request Broker Architecture (CORBA), is developing a language mapping for C# to enable it to communicate through CORBA with applications written in other languages such as C, C++, Cobol, Java, Python, and Ada.

See Also C++ ,.NET platform

C2

A security standard for computer systems established by the National Computer Security Center (NCSC).

Overview

The NCSC is a U.S. government agency responsible for evaluating the security of software products. The C2 security standard is defined in the Trusted Computer Systems Evaluation Criteria (TCSEC) manual (or Orange Book) published by the NCSC.

The NCSC rated Microsoft's Windows NT 3.5 (with Service Pack 3) C2-compliant. The C2 designation assures that the base operating system satisfies a number of important security criteria. This designation also represents an independent, unbiased evaluation of the system architecture's security with regard to the government's operating and implementation standards. Windows 2000 also supports C2, but is still undergoing the NCSC evaluation process.

A C2 rating does not indicate that a system is free of security bugs; instead, this rating certifies that the computer system's underlying architecture is suitable for high-security environments in specific networking configurations. It is incorrect to say that Windows NT is C2-certified or runs in C2 mode. Only a complete computer system (including hardware) can be rated C2. A rating of C2 means that in a particular implementation, in a particular networking environment and configuration, using specific hardware and software, a computer network using a Windows NT operating system can apply for, and might receive, C2 certification.

According to the Orange Book, in a C-level system, the security policy must be based on what is known as Discretionary Access Control (DAC), which essentially means that users of the system can own objects (such as files and directories) and can control access to these objects by other users. A user who establishes control over an object is responsible for granting or denying all access rights to that object. In other words, the owner of an object grants or denies users access to the object at his or her discretion. This is in contrast to a B-level system, in which Mandatory Access Control (MAC) specifies that all objects have security levels that are defined independent of the object's owner.

For More Information

Visit the NCSC at www.radium.ncsc.mil.

See Also security

CA

Stands for certificate authority, any entity (individual, department, company, or organization) that issues digital certificates to verify the identity of users, applications, or organizations.

See Also certificate authority (CA)

cabinet

An enclosure with a built-in rack for holding and organizing patch panels, switches, hubs, routers, servers, and any other networking equipment within a wiring closet.

Overview

Cabinets can be wall-mounted or freestanding, come in various heights, and are usually standardized for 19-inch-wide shelving and paneling. They generally come in 83-inch and 48-inch heights, although many vendors offer custom-designed cabinets. The reason for standardizing the width to 19 inches (18.31 inches to be precise) is that hubs, switches, routers, and other networking devices are produced in this width so that they can be organized in racks and cabinets designed for this purpose. Cabinets come with a variety of accessories for organizing cables, power strips, and other equipment. Because heat can accumulate in cabinets, they usually include vented walls and have an exhaust fan on top. A cabinet will often have a locking front panel made of clear plastic so that status lights on equipment are easily visible. Shelves can be fixed, mounted, or sliding to enable easy access to the sides and backs of equipment.

Cabinet. A typical cabinet for mounting networking and telecommunications equipment.

Notes

When should you choose a cabinet instead of a rack? Choose a cabinet for equipment that is exposed to user traffic, and then you can lock equipment away when the room itself is not locked. Cabinets are also best for expensive networking equipment that you do not want anyone but authorized administrators to touch. Cabinets with filter fans installed can protect equipment in environments where dust is a problem. Use filler panels to enclose areas of the cabinet that are not occupied by equipment.

See Also premise cabling ,rack

cabinet file

A file with the extension .cab that stores compressed files, usually for distributing software on Microsoft platforms.

Overview

Cabinet files can contain multiple files in a compressed state, or a single compressed file can be spread over several cabinet files. During installation of software, the setup program decompresses the cabinet files and copies the resulting files to the user's system.

Cabinet files can be digitally signed using a Microsoft technology called Authenticode. This allows setup files to be downloaded safely over distrusted networks such as the Internet. Cabinet files are compressed using a compression algorithm called MSZIP, which is based on the Lempel-Ziv algorithm.

Notes

Cabinet files in Microsoft Windows 95 were located in the Win95 directory on the source CD, and most were represented as a series of large files with names such as Win95_1.cab and Win95_2.cab. Windows 98 uses a different naming convention and names many of its smaller cabinet files by function rather than by the order in which they are used during setup. Naming by function makes the extraction of files easier, which in turn makes the setup process smoother.

In Windows 95, if you want to extract specific operating system files from a cabinet file (for example, to replace a missing or corrupt file), you have to use the command- line utility called extract. Using Windows 98 and later versions, you can simply double-click on a cabinet file using Windows Explorer to view its contents in a new window, double-click on the specific file you want to extract, and specify the destination folder to send it to. You can also use the System File Checker tool to extract files without knowing which specific cabinet file they are located in.

See Also Authenticode

cable modem

A device that allows your computer to access the Internet through dedicated broadband transmission networking services by means of your home cable TV (CATV) connection.

Overview

Cable modems modulate and demodulate analog signals like regular modems, but for transmission over broadband video services instead of telephone voice services. A cable modem can be internal or external and can interface with the coaxial cable connection at the user's end and the Cable Modem Termination System (CMTS) at the cable provider's head office.

Cable modem and Asymmetric Digital Subscriber Line (ADSL) are competing technologies for bringing high- speed broadband Internet services to homes and businesses. Cable modems offer downstream speeds of 10 megabits per second (Mbps) and higher, but competing technologies, lack of standards, and implementation costs have slowed widespread deployment and use of this technology.

There are two basic types of cable modem services:

Implementation

In a typical one-way cable modem implementation, the CMTS uses separate subsystems for upstream and downstream connections that terminate at a router. The downstream subsystem is designed for converting incoming Internet Protocol (IP) traffic into radio frequency broadband signals that are broadcast using a broadband network hub (BNH) over cable TV wiring to local groups of connected subscribers. The upstream subsystem usually consists of banks of ordinary telephone modems to allow for easy expansion of services to additional subscribers. The router is used to route network traffic between clients and local content servers hosted by the cable provider, and to the Internet.

Downstream traffic is typically modulated using 64 or 256 Quadrature Amplitude Modulation (QAM) and can achieve speeds of 27 Mbps or higher. Upstream traffic is encoded using 16 QAM or Quadrature Phase Shift Keying (QPSK) and typically ranges from 320 kilobits per second (Kbps) to several Mbps.

Marketplace

Excite@Home was an early player in the cable modem marketplace, and many local cable companies followed offering high-speed Internet access to their cable TV subscribers. Consolidation in the industry has led to the emergence of several major players, including AT&T Broadband and AOL/Time Warner.

Cable modem. A one-way cable modem service.

Cable modem Internet access costs around $40 a month in most locations but, because their operation depends on the wiring infrastructure of cable TV systems, cable modems are almost exclusively offered for residential customers and home-based businesses. Some cable modem providers such as Cox Communications also compete with telcos by offering voice as well as data services.

The cable modem market is growing more rapidly than the Digital Subscriber Line (DSL) market, its main competitor. This is happening despite the security and bandwidth issues associated with cable modems (see below), and is driven largely by the complexity of DSL compared to the simplicity of cable modems and by the fact that cable modems are not limited by the 3-mile (4.8-kilometer) distance restriction that governs how far a DSL customer can be from the DSL provider's central office (CO). A Federal Communications Commission (FCC) survey found that cable modem subscribers in the United States grew from just over 100,000 in 1998 to almost 1 million in 1999. In 2000 worldwide cable modem usage was estimated at over 6 million subscribers, almost twice that of DSL.

Issues

Most cable television companies have jumped on the cable modem bandwagon to offer Internet access for their customers, but this has not been without problems. Existing tree-and-branch coaxial systems were built for one-way transmission and often require expensive upgrades to make them suitable for two-way data transmission. Some of the steps typically involved in the upgrade are upgrading core distribution networks to fiber (creating a hybrid fiber-coax network) and troubleshooting ingress noise due to poor shielding and loose connectors.

Many cable operators, although they support multimegabit upstream data speeds, have instead restricted upstream speeds to 128 Kbps or lower to help prevent customers from running rogue Web servers on their network in violation of their customer agreements. Also, all subscribers in a one-way cable modem local service area are essentially on a local area network (LAN) and, if they have a packet sniffer, they can see one another. If you are using a one-way cable modem with Microsoft Windows on your computer, you should disable file and print sharing so that other users in your local service area cannot see your system or access resources on it. The cable modem industry itself has proposed a solution to the security issue through an initiative called Data Over Cable Service Interface Specification (DOCSIS) that specifies encryption of all cable modem traffic using 56-bit Data Encryption Standard (DES), although DES is no longer secure.

Furthermore, although in theory a cable modem might support downstream transmission speeds of 10 Mbps or higher, in practice downstreams may be significantly less than 1 Mbps. This is because all cable modems serviced by a given neighborhood Cable Modem Termination System (CMTS) are essentially on a LAN and share the available bandwidth. Thus, the more modems deployed in a given neighborhood, the slower the system performs for Internet access, especially when some users are downloading large files or streaming media (a common occurrence among cable modem users). In this respect DSL has an advantage because it is a secure, private connection directly to the Internet.

Notes

If you have a one-way cable modem installed on a computer running Microsoft Windows 2000, Windows XP, or Windows .NET Server and it is not working properly, you might have IP Auto-Configuration Addressing enabled, causing an addressing problem that prevents packets from being routed successfully to your machine. Also, try checking with your cable service provider to determine whether you have correctly configured the line-in frequency, line-out phone number, and proxy server address.

For More Information

Visit Cablemodems.com at www.cablemodems.com

See Also Asymmetric Digital Subscriber Line (ADSL) ,broadband Internet access ,Data Over Cable Interface Specification (DOCSIS) ,modem

cable run

A length of installed cable connecting two network components that are not in immediate proximity to one another.

Overview

Laying cable runs is the main work of installing premise cabling in a customer premises. Types of cable runs include

Different grades of cabling must be used for different runs to ensure compliance with building codes and safety standards. Examples include polyvinyl chloride (PVC) cabling and plenum cabling. The Electronic Industries Association/Telecommunications Industry Association (EIA/TIA) wiring standards specify guidelines for using cable types and grades.

Notes

Cables connecting computers to patch panels (drop cables) and connecting patch panels with hubs and switches (patch cables) are not generally referred to as cable runs because they are not permanently installed and are usually quite short. The term cable run generally applies to cables that run from the patch panels in a wiring closet to other parts of the building.

When installing horizontal or vertical cable runs, use the highest grade that your budget will allow in order to accommodate future upgrades of your network's speed and bandwidth. Use the enhanced Category 5 (Cat5e) cabling-which is a variety of unshielded twisted-pair (UTP) cabling-for all copper cabling installations. If you can, install parallel vertical runs of fiber-optic cabling with copper cabling in vertical rises to allow for future expansion of your network backbone. Installing two cables at once saves costs later, even if you need only the copper cabling now.

See Also cabling ,premise cabling

cable tester

Any device for measuring the integrity and transmission characteristics of cabling.

Overview

Cable testers perform various functions to test network cabling for compliance with cabling standards developed by bodies such as the Telecommunications Industry Association (TIA), the International Organization for Standardization (ISO), and the International Electrotechnical Commission (IEC). Cable testers are useful to local area network (LAN) administrators, cable installers, and field service providers for testing and certifying cabling installations as compliant with these standards.

Cable tester. A handheld cable tester.

Cable testers come in a variety of forms, ranging from handheld to briefcase size. They are generally divided between those used for testing fiber-optic cabling and those used for testing copper cabling. Different testers have different capabilities, but their general function is to measure various electrical characteristics across different ranges of frequencies. Testers will typically measure some or all of the following parameters at various frequencies from 100 megahertz (MHz) to 350 MHz and beyond:

Uses

Cable testers are particularly important for testing Category 5 (Cat5) and enhanced Category 5 (Cat5e) structured wiring deployments to see if they will properly support Gigabit Ethernet (GbE) networking. GbE pushes unshielded twisted-pair (UTP) cabling to its limits and requires top-quality properly installed cabling to operate as expected. Particularly in older buildings with existing Cat5 wiring, use a cable tester to measure such parameters as cross-talk and NEXT to determine if packet loss will occur over portions of the network. Particularly vulnerable portions include cable termination at RJ-45 wall jacks and at patch panels inside wiring closets. Poor quality patch cables between workstations and wall jacks are a common problem, as are patch panel connections that have been untwisted beyond the specified limits.

Marketplace

A number of vendors produce different kinds of test equipment for cable testing. Two of the top vendors of such equipment include Fluke Corporation, which offers a wide range of cable testers, and Hewlett- Packard.

Today's cable testers can perform comprehensive and programmable sets of autotests for a variety of cable types. A good cable tester can tell you at the push of a button whether installed wiring can support different kinds of networking architectures-such as coax, 10BaseT, 100BaseT, 100BaseVG, and Token Ring. Cable testers can also store measurements taken so that they can be analyzed separately afterward.

The most accurate types of cable testers for UTP cabling are those that can test and certify Category 5 (Cat5) cabling to Level II TSB-67 compliance and support the Institute of Electrical and Electronics Engineers (IEEE) TSB95 field testing specifications. An all-in-one cable tester is an invaluable tool and a good investment for the network administrator. It can make up for its cost in higher network availability.

Notes

Use a fiber-optic tester and an optoelectronic light source to test both ends of a new spool of fiber-optic cabling before beginning an installation with this cable. A good fiber-optic cable test should give you not only a pass/fail analysis of an installed cabling setup, but also quantitative values of the optical link capabilities of your wiring configuration.

See Also cabling ,network troubleshooting ,test equipment

cabling

Any wires used for connecting computers and networking devices together to enable them to communicate.

Overview

Cabling constitutes the passive portion of any computer network-the active portion consists of the servers, workstations, switches, routers, and other components. Good cabling provides the foundation for creating reliable local area networks (LANs). Cabling is also used for connecting LANs into wide area networks (WANs). Network administrators are usually involved in the deployment of LAN cabling, but WAN cabling is usually the responsibility of the telecommunications carriers whose services are being leased.

Two basic types of cabling are used in LAN networking environments:

Implementation

The process of installing cabling in a building for purposes of computer networking is called establishing premise wiring. Unfortunately, cabling is only as good as the way it is deployed and only as good as the connectors and other elements that help make a computer network. Poor quality cabling, improperly installed cabling, or cheap wall plates and patch panels can make a cabling system perform more poorly than expected, particularly at GbE speeds.

The Telecommunications Industry Association (TIA) and the Electronic Industries Alliance (EIA) have defined a series of standards on the required electrical characteristics of commercial cabling for computer networking and also standards for the proper layout and organization of premise cabling. These standards are called the EIA/TIA wiring standards. The EIA/TIA-568A Commercial Building Telecommunication Cabling Standard specifies standards for each of the following:

Cabling installed in a building must also meet all legal requirements, including federal and local building regulations for fire safety. Do not attempt to wire a building unless you are fully familiar with the regulations.

Choosing the right kind of cabling at the beginning of an installation can save considerable expense when you later upgrade networking equipment for higher transmission speeds. Some tips for successfully outsourcing cabling installations for computer networks in buildings include

If you plan to lay cable yourself for your building, here are a few more guidelines:

Notes

Specialized cables-such as serial, parallel, or Small Computer System Interface (SCSI) cables-are used to connect peripherals and therefore do not serve the same purpose as the cables just discussed. Serial cables and other special purpose cables are generally very short and are not permanently installed.

Note that not all networks use physical cabling. Wireless networks can use infrared, microwave, radio, or some other form of electromagnetic radiation to allow networking components to communicate with each other. A cabled network is sometimes referred to as a wireline network, as opposed to a wireless network.

For More Information

Look at www.cablingstandards.com. You can also visit the BICSI Web site at www.bicsi.org.

See Also copper cabling ,fiber-optic cabling ,premise cabling

CA certificate

Also called a root certification, a digital certificate that can be used to verify the identity of the certificate authority (CA) itself.

Overview

The CA certificate contains the identification information and public key for the certificate authority it identifies. A certificate authority that is part of a hierarchical public key infrastructure (PKI) receives its CA certificate from the CA directly above it in the hierarchy. A root CA at the top of a PKI hierarchy must self-sign its own certificate, in effect certifying itself.

The CA certificate plays an important part in the workings of the Secure Sockets Layer (SSL) protocol. The CA's public key, contained in the CA certificate, is used to validate all other digital certificates that have been issued by that CA for entities (individuals, systems, companies, and organizations). When an entity such as a Web browser (perhaps Microsoft Internet Explorer) or a Web server (perhaps Microsoft Internet Information Services) requests a digital certificate from a CA, the CA certificate identifies the CA that issues the certificate.

This CA certificate is downloaded from a shared storage location at the certificate authority and installed onto the Web server or browser. Later, when the Web browser tries to access the Web server using the SSL protocol, the Web browser uses the CA certificate to validate the Web server's certificate. Similarly, the server can use the CA certificate to validate the browser client's certificate, if it has one.

Notes

The digital CA certificate for a CA must be kept in a location that is readily available for all servers and clients that will access it and install it on their Web browser or Web server. From this location, Web servers and Web clients that need to use the SSL protocol must obtain and install the CA certificate in their certificate stores. On Microsoft Certificate Server, this location is the default Web location http://Server_Name/certsrv, where Server Name is the name of the Microsoft Windows NT server on which Microsoft Certificate Server is installed.

Internet Explorer comes with the CA certificates of a number of certificate authorities preinstalled. These root certificates enable Internet Explorer to be used for functions such as SSL authentication and sending secure e-mail. If you want to use the services of a CA that does not have its CA root certificate installed in Internet Explorer, you can visit that CA's Web site to find instructions on how to obtain its root certificate. Administrators can also use the Internet Explorer Administration Kit (IEAK) for importing and installing root certificates on Web browsers prior to installation on client machines.

See Also certificate authority (CA) ,client certificate digital certificate

caching

Generally, any mechanism for storing frequently needed information in accessible memory so that it can be quickly retrieved. This article focuses on caching as the temporary storage of Web content to enable faster access by users.

Overview

While caching in general has been around a long time and has been implemented in various ways in computer systems and networks (see Notes at the end of this article), caching of Web content has exploded over the last few years into a big industry. In the context of the Internet, caching means the copying of Web content to storage locations near the client so that the client's Web browser can more quickly access the information. Caching speeds up accessing Web content and makes better use of available bandwidth (especially important when the Internet is accessed over slow and costly wide area network [WAN] connections).

While the emergence of broadband Internet access may seem to sidestep the need for caching, this is not really so. Most analysts agree that with the Internet, providing faster access simply drives up demand further and raises expectations, leading to even greater traffic congestion and frustration for users. The solution to bogged-down Internet access is caching.

Implementation

Caching can be implemented in a variety of ways using different systems. The simplest arrangement is deploying cache servers on the network. A cache server is used to speed corporate access to Web content on the Internet by caching the Web pages that users most frequently request. Cache servers reduce network traffic and speed up access to frequently requested content by caching such content. If a user requests a page that has recently been cached, the page will be retrieved from the cache server instead of from the Internet. Pages are held in the cache until they expire.

The cache server locates the content closer to the users who need it than the Web servers that contain the original version of this content. In general, the closer the cache to the user, the faster the response time the user will experience when trying to access this content in a browser. In the enterprise, cache servers are typically deployed at the edge of the corporate network, thus reducing overall WAN link traffic and congestion and saving money. Many firewalls and proxy servers include some form of content caching. Although firewalls and proxy servers are mainly concerned with securing access between a private corporate network and an distrusted public network such as the Internet, including cache server functionality in these products enhances their overall performance.

Caching. How a simple cache server can improve access time for clients.

Caching servers are also useful in situations where a sudden increase in Web traffic is anticipated, as when a major sports or fashion event will be covered on the Web. In this case, simply throwing bandwidth at the problem of Internet traffic congestions is not a viable solution because increased bandwidth simply leads to increased demand from users. Instead, by preloading content from Web servers to caching servers, users will not overwhelm the Web servers on the day of the event and be disappointed. This use for caching servers is sometimes called "dealing with flash crowd control" or the "instant popularity problem." By using a network of cache servers in such situations and configuring replication appropriately between them, supply can be scaled for demand at virtually any level.

Dedicated cache servers are also used in high-traffic situations within the Internet backbone itself to reduce congestion on the backbone. Caching servers are often located at Internet service providers (ISPs) and Network Access Points (NAPs) for improving the overall performance and responsiveness of the Internet. This can be used to reduce the effect of bottlenecks on ISP networks and to reduce the cost of local ISPs buying bandwidth from regional ISPs.

Cache servers can even be deployed at the customer premises and configured with preloaded content to speed access to corporate intranets. Such a scenario is similar to the built-in content caching capability of Web browsers, but in this case the content is cached locally on a machine separate from the client machine to improve performance even more.

Types

As far as administrators are concerned, caching servers come in two basic types:

In addition, from the user's perspective, cache servers can be implemented in different ways:

Cache servers also determine whether to flush content from their cache in different ways:

Marketplace

The caching industry has exploded over the last few years, driven by the tremendous growth of the Internet and the demand of users for fast performance in accessing Web sites. In the arena of general caching software, the top players include Microsoft Corporation's Internet Acceleration and Security Server (IAS Server), the successor to Microsoft Proxy Server; Novell's Internet Caching System; and several UNIX-based solutions.

In the arena of prepackaged caching appliances, offerings are available from Dell Computer Corporation's (PowerApp.cache), Compaq (TaskSmart), Cobalt Networks (Qube), Network Appliance (NetCache), and many others. Caching appliances range from those targeted for corporate intranets to powerful caching solutions for ISPs and telecoms.

A number of pure-play caching vendors have had a large impact on the caching market. Some of the big players here include Inktomi Corporation, CacheFlow, and Network Appliance. Inktomi offers routers and load balancers from Alteon WebSystems and Foundry Networks bundled together with Inktomi's Traffic Server caching software. Cisco Systems and Lucent Technologies also offer high-end caching appliances with proprietary operating system kernels tuned for top performance in this application.

A relatively new approach is called predictive client- side caching and involves configuring a plug-in for client browsers that determines what kinds of content the client accesses and then attempts to preload such content during idle times so that when the client requests it the content is already in the browser cache. Blueflame, a product from Fireclick, is one example of predictive client-side caching technology. Fireclick also has a hosted version of this application called Netflame.

Packeteer has a product called AppCelera Internet Content Accelerator (ICX) that boosts performance by adapting requested content to the type of browser requesting it and by compressing content to make better utilization of available bandwidth.

Issues

Caching of dynamic Web content presents an ever-greater challenge as more and more Web sites move away from static informational content to deploying database-driven e-commerce Web applications. Dynamic Web pages are generated from databases in response to user queries and often include some form of personalization as well. Dynamic content cannot be cached the way static content can, but a number of vendors have come up with various methods for improving the performance of dynamic Web applications by using caching. For example, the components of a Web application can be cached for reuse across multiple user sessions. Another approach is to dynamically monitor the configuration of Web applications to better manage stale cache content. Vendors of dynamic caching systems include Xcache Technologies, Chutney Technologies, and SpiderSoftware. NetScaler offers a caching device that routes requests for static content to traditional cache servers while multiplexing requests for dynamic content over persistent connections with Web servers to improve performance.

Notes

Caching in a general sense is used in various ways by operating systems, applications, and network devices to improve performance by providing temporary storage of information that needs to be quickly accessed. Some common examples include

For More Information

Find out more about caching technologies at these sites: www.caching.com and www.web-caching.com

See Also Content Delivery Provider (CDP) ,Web server

Caching Array Routing Protocol (CARP)

A protocol developed by Microsoft Corporation that allows multiple proxy servers to be arrayed as a single logical cache for distributed content caching.

Overview

Caching Array Routing Protocol (CARP) is implemented as a series of algorithms that are applied on top of Hypertext Transfer Protocol (HTTP). CARP allows a Web browser or downstream proxy server to determine exactly where in the proxy array the information for a requested Uniform Resource Locator (URL) is stored.

CARP enables proxy servers to be tracked through an array membership list that is automatically updated using a Time to Live (TTL) countdown function. This function regularly checks for active proxy servers in the array. CARP uses hash functions and combines the hash value of each requested URL with each proxy server. The URL/proxy server hash with the highest value becomes the owner of the information cached. This results in a deterministic location for all cached information in the array, which enables a Web browser or downstream proxy server to know exactly where a requested URL is locally stored or where it will be located after it has been cached. The hash functions result in cached information being statistically distributed (load balanced) across the array. Using hashing means that massive location tables for cached information need not be maintained-the Web browser simply runs the same hashing function on the object to locate where it is cached.

Advantages and Disadvantages

CARP provides two main benefits:

See Also caching ,proxy server

caching-only name server

A name server in the Domain Name System (DNS) that can resolve name lookup requests but does not maintain its own local DNS database or zone file of resource records.

Overview

Caching-only name servers do not have their own DNS databases. Instead, they resolve name lookup requests from resolvers by making iterative queries to other name servers. When the responses to these queries are received, the caching-only name server caches them, in case another resolver issues the same request within a short period of time.

A caching-only name server is not authoritative for any particular DNS domain. It can look up names that are inside or outside its own zone.

Notes

Caching-only name servers are not the only kind of name server that performs caching of resolved queries. For example, primary name servers also cache name lookups that they perform. This caching generally improves the primary name server's response to name lookup requests from resolvers. Caching-only name servers are distinguished by the fact that they perform only one function: issuing iterative queries to other name servers and then caching the results.

Caching-only name servers provide support for primary and secondary name servers in environments where name lookup traffic is heavy. Using caching-only name servers where possible also reduces the overhead of zone transfers between name servers on a network.

See Also Domain Name System (DNS) ,name server

caching service provider (CSP)

A company that maintains caching servers that speed the transfer of information across the Internet's infrastructure and offers managed access to these servers for a fee.

Overview

Many companies think that if they host their Web site at an Internet service provider (ISP) or at a major Web hosting company, the site will always be accessible from anywhere on the Internet, but this is not necessarily true. Traffic congestion can cause access to a Web server to be slow and unreliable from various parts of the Internet at various times of the day, and equipment failures (such as routes going down at Internet peering points) can make a server completely inaccessible to certain portions of the Internet until the problem is fixed. ("Peering" means two ISPs or other providers passing traffic between each other's customers.)

One solution is to mirror (replicate) your Web server at various points around the globe so that a copy of your site is relatively close to any location on the Internet. For companies with a global presence, this is a fairly simple solution to implement, but most companies do not have the presence or the resources to implement global mirroring. A better solution might be to use the services of a caching service provider (CSP), which maintains cached copies of your Web site at various points in the Internet's infrastructure and provides tools for managing and load balancing the content to handle traffic spikes that occur at certain times of the day or year.

CSPs maintain data centers around the world with caching server farms that have high-speed connections to the Internet's backbone. These caching servers are usually designed to cache Web content and often support features such as content management and proxying. Caching servers can also be used within the corporate network to speed access to large, distributed corporate intranets.

See Also caching

CAL

Stands for client access license, a license that grants a client machine access to a Microsoft BackOffice product running on a network of computers.

See Also client access license (CAL)

callback

A security feature for remote access servers.

Overview

Callback provides an extra layer of security for users dialing in to a remote access server. When callback is configured, the client software dials in to a remote access server and has the user's credentials authenticated. The remote access server then disconnects the client and calls the client back at a previously specified phone number. Callback might be configured in the following ways:

Callback is an optional feature supported by the Routing and Remote Access service of Microsoft Windows 2000 and Windows .NET Server. Note that in Windows 2000 and Windows .NET Server, the phone number specified for callback is called the Caller ID number.

See Also remote access

Callback Control Protocol (CBCP)

A protocol that enables callback for establishing Point- to-Point Protocol (PPP) connections.

Overview

The Callback Control Protocol (CBCP) is part of Microsoft Corporation's implementation of the Point- to-Point Protocol (PPP). CBCP makes it possible for a PPP server to call back the remote dial-in client to complete initiation of a PPP dial-up session. Callback is a useful security feature for ensuring that dial-in clients are authentic.

Implementation

The CBCP is used during the third phase of establishing a PPP connection. After the PPP link is established using the Link Control Protocol (LCP) and the user's credentials are authenticated using Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) or some other authentication protocol supported by the client, the network access server (NAS) at the PPP service provider can optionally initiate a PPP callback control phase, provided that callback is configured on the server. The NAS and the PPP clients both disconnect from the PPP link, and the NAS calls the client back using the specified callback phone number. If the client responds, the link is reestablished; no further authentication is needed, and compatible network protocols are negotiated so that data transmission can begin.

See Also Point-to-Point Protocol (PPP)

campus area network (CAN)

A group of connected local area networks (LANs) on a campus.

Overview

A campus area network (CAN) is intermediate in size between a LAN, which typically resides in a single room or building, and a metropolitan area network (MAN), which spans a city or metropolitan area. CANs exist on university campuses, in industrial parks, and in similar collections of buildings under a single administrative authority.

Implementation

CANs are typically built in hierarchical fashion starting from the top or inside with a core network (usually a collapsed backbone), a distribution network (routers or switches in different buildings), an access network (a collection of hubs and switches within wiring closets on each floor of the buildings), and finally end-user stations.

See Also local area network (LAN) ,metropolitan area network (MAN) ,Personal Area Network (PAN) ,wide area network (WAN)

CAN

Stands for campus area network, a group of connected local area networks (LANs) on a campus.

See Also campus area network (CAN)

CAP

Stands for carrierless amplitude and phase modulation, a line coding scheme in which data is modulated using a single carrier frequency.

See Also carrierless amplitude and phase modulation (CAP)

capture

A collection of frames gathered from network traffic by a sniffer.

Overview

You can use packet-sniffing software such as Microsoft Network Monitor (which is included in Microsoft Systems Management Server and in a simplified form in Microsoft Windows 2000, Windows XP, and Windows .NET Server) for capturing all kinds of traffic on the network. This captured traffic is displayed in the capture window as a variety of statistics and details about the nature of the traffic. Additional windows can display details about individual packets that have been captured.

Capturing network traffic is a common troubleshooting technique on enterprise-level networks. Captures can show whether services such as Dynamic Host Configuration Protocol (DHCP), Windows Internet Name Service (WINS), Domain Name System (DNS), and other common network services are performing properly. Captures can also isolate servers that are generating excessive network traffic because of failed hardware. Captures can even be used to detect unauthorized traffic initiated by hackers and disgruntled employees and to profile network traffic for planning purposes.

See Also capture window ,sniffing

capture window

In Microsoft Network Monitor, the window that displays the statistics about the frames being captured on a network.

Overview

The capture window displays four kinds of real-time statistics concerning the traffic that an administrator captures using Network Monitor:

You can toggle these various windowpanes on and off during a capture to focus on statistics of interest.

See Also capture ,sniffing

Carnivore

An Internet surveillance system developed by the FBI (Federal Bureau of Investigation).

Overview

Carnivore was designed to help the FBI collect evidence to convict terrorists, drug smugglers, and hackers. Carnivore is a self-contained "black-box" Internet Protocol (IP) traffic filtering system that sniffs network traffic to find e-mail and other traffic that contains evidence of criminal activity.

Implementation

To use Carnivore, the FBI first obtains a court order to capture specific types of Internet traffic that may contain evidence of criminal wrongdoing by parties under consideration. The FBI then brings the Carnivore system to an Internet service provider (ISP) and connects the system to the backbone switches of the ISP's network. Carnivore then monitors all traffic through the ISP, capturing only such traffic as matches the filter conditions established in the court order (this is called minimization-Carnivore does not snoop all traffic indiscriminately). For example, Carnivore might filter all messages coming from or going to a specific IP address block or having a certain keyword in the Subject line.

See Also sniffing ,security

CARP

Stands for Caching Array Routing Protocol, a protocol developed by Microsoft Corporation that allows multiple proxy servers to be arrayed as a single logical cache for distributed content caching.

See Also Caching Array Routing Protocol (CARP)

carrier

A company that provides various kinds of telecommunication services to its customers.

Overview

A carrier provisions telecommunication services to the customer premises. These services include voice transmission, data transmission over analog modems, Integrated Services Digital Network (ISDN), digital subscriber line (DSL), frame relay, and anything else the carrier's equipment supports. There are two basic kinds of carriers: LECs and IXCs.

A local exchange carrier (LEC) is a company that provides access to both local and long-distance telephone services through the local loop connecting the telco's central office (CO) with the customer premises. In the United States, LECs are typically one of two kinds:

An inter-exchange carrier (IXC), on the other hand, is a company that provides long-distance services only. IXCs own their own telecommunication facilities and provide long-distance services between LECs located in different toll-free areas. The big three in the IXC arena in order of size are AT&T, MCI WorldCom, and Sprint Corporation.

All long-haul carriers in the United States use Synchronous Optical Network (SONET) or ATM (Asynchronous Transfer Mode)/SONET as their backbone transport, and most local telcos use ATM in their own backbone networks also. Some LECs are also deploying Gigabit Ethernet (GbE) as an alternative to ATM for metropolitan area networks (MANs) that can bring GbE ports directly to the edge of corporate networks, providing end-to-end Ethernet connectivity for corporate wide area networks (WANs).

Outside the United States, most carriers use Synchronous Digital Hierarchy (SDH), essentially a variant of SONET.

Implementation

Almost all carriers rely on ATM as their underlying backbone transport and use this backbone to provision local and long-distance voice services, Internet access over DSL, leased-line WAN links, and other services. A large portion of the backbone of most long-haul carriers is currently at or near OC-48, providing maximum throughput of 2.488 gigabits per second (Gbps), but these backbone fiber connections are constantly being upgraded to support higher speeds such as OC-192 and OC-768.

Carriers usually house their high-speed switching equipment in large buildings called colocation centers. These centers have this name because under the Telecommunications Act of 1996, competitive local exchange carriers (CLECs) are allowed to lease space within carrier facilities for locating their own switching equipment. Another name for these centers is "data centers," and they are usually huge nondescript buildings that typically occupy hundreds of thousands of square feet. Sometimes several floors of existing buildings are used for data centers, but the trend is to build new centers to ensure that the highest standards of fire safety and security are used.

Marketplace

The global carrier market has become complex over the last decade, with traditional incumbent telcos in the United States and Post, Telegraph, and Telephone (PTT) companies in Europe being challenged on all sides by newcomers to the game. International carriers can be classified in different types, including

To complicate things further, many large national carriers are constantly making efforts to expand into the international market by acquiring, or merging with, other carriers, upgrading their core equipment to provision new high-speed data services, while relegating some existing services to the legacy domain and trying to cope with the ever-exploding amounts of Internet bandwidth demanded by their customers. Because of the state of flux of the global telecommunications carrier market, the enterprise architect's dream of simple, seamless, global WAN connectivity remains a complicated reality of tariffs, interoperability issues, and politics.

See Also Competitive Local Exchange Carrier (CLEC) ,Incumbent Local Exchange Carrier (ILEC) ,inter-exchange carrier (IXC) ,local exchange carrier (LEC) ,telecommunications services

carrierless amplitude and phase modulation (CAP)

A line coding scheme in which data is modulated using a single carrier frequency.

Overview

Carrierless amplitude and phase modulation (CAP) is used for transmission of voice information over a phone line. The transmission is considered "carrierless" because the carrier is suppressed before transmission and is reconstructed at the receiver. CAP is algorithmically similar to the quadrature amplitude modulation (QAM) line coding scheme, which encodes bits as discrete phase and amplitude changes, but it has different transmission characteristics.

Notes

Some competitive local exchange carriers (CLECs) deploy Asymmetric Digital Subscriber Line (ADSL) using CAP as the encoding method, but results of some independent tests suggest that CAP-encoded ADSL lines might cause spectral interference with proximate T1 lines and Integrated Services Digital Network (ISDN) circuits, resulting in bit errors that can reduce throughput. However, these tests might be misleading because of the limited number of ADSL circuits currently deployed by CLECs. Check with your carrier before signing up for ADSL services to get the latest information about this issue.

Such interference is not a problem with symmetric digital subscriber line (SDSL) technologies, which use the 2B1Q encoding scheme. Furthermore, ADSL deployed by incumbent local exchange carriers (ILECs) uses discrete multitone (DMT) technology, which does not produce the same degree of spectral interference as CAP. Competitive local exchange carriers generally do not use DMT for ADSL because they must deal with the copper local loop, which effectively supports DMT only about half the time but can support CAP about 85 percent of the time. Furthermore, DMT has been adopted as the standard for ADSL by both the American National Standards Institute (ANSI) and the International Telecommunication Union (ITU).

See Also line coding

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

The media access control method used by AppleTalk.

Overview

Carrier Sense Multiple Access with Collision Avoidance (CDMA/CA) is a type of media access control method for placing signals on baseband transmission networks. Because baseband networks can carry only one data signal at a time, there must be some way of controlling which station has access to the media at any given time. CSMA/CA is one such control method.

Uses

CSMA/CA is the standard access method for AppleTalk networks based on LocalTalk. LocalTalk is a legacy network media technology that specifies the proprietary cabling components of the original AppleTalk networking architecture. LocalTalk uses a bus topology or tree topology that supports up to 32 stations on a network.

Implementation

In networking technologies that use CSMA/CA as their access method, stations announce their intention to transmit before they actually transmit their data onto the network media. Each station "listens" constantly to the wire for these announcements, and if it hears one, it avoids transmitting its own data. In other words, on a CSMA/CA network, stations try to avoid collisions with signals generated from other stations. The extra signaling generated by CSMA/CA makes it a slower access method than the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) method used in Ethernet networking.

See Also AppleTalk, Carrier Service Multiple Access with Collision Detection (CSMA/CD), Ethernet, media access control method

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

The media access control method used by Ethernet.

Overview

Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a type of media access control method developed by Xerox Corporation in the 1970s for placing signals on baseband transmission networks. Because baseband networks can carry only one data signal at a time, there must be some way of controlling which station has access to the media at any given time. CSMA/CD is one such control method.

Implementation

In networking technologies that use CSMA/CD as their access method, a station first "listens" to the network media to make sure there is no signal already present from another station before it tries to place its own signal on the media. If a carrier signal is detected on the media, which indicates that a station is currently transmitting a signal, no other station can initiate a transmission until the carrier stops. If no carrier is detected, any station can transmit a signal.

If two stations listen to the wire and detect no carrier signal, they may both decide to send signals simultaneously. If this happens, a collision occurs between the two signals generated. Next, both stations detect the collision and stop transmitting their signals immediately, sending out a jamming signal that informs all other stations on the network that a collision has occurred and that they should not transmit. Meanwhile, the two stations whose signals created the collision cease transmitting and wait random intervals of time (usually a few milliseconds) before attempting to retransmit.

Issues

CSMA/CD is known as a contention method because computers contend for the chance to transmit data onto the network media. CSMA/CD is the standard access method for Ethernet networks. This method has two main drawbacks:

Notes

The designation CSMA/CD derives from the following:

See Also Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) ,Ethernet ,media access control method

carrier signal

An alternating electromagnetic signal with a steady frequency upon which information is superimposed by some form of modulation.

Overview

The specific frequency at which a carrier signal runs is called the carrier frequency and is measured in hertz (Hz). The modulation of the carrier signal enables information such as voice or data traffic to be integrated into the carrier signal. The carrier signal thus "carries" the voice or data information using modulation technologies.

The type of modulation used in digital communication systems depends on whether the underlying carrier signal is analog or digital. For example, in digital radio or microwave communication, some form of digital-analog modulation, such as frequency-shift keying (FSK), is used to impose the digital (binary) information on the analog carrier wave. On the other hand, in Ethernet networking, a digital-digital encoding scheme called Manchester coding is used to enable the digital signal to carry binary 1s and 0s.

In Ethernet networks, the carrier signal plays an important role in the media access control method that Ethernet uses, namely the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) method.

See Also Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

cascaded star topology

A layered form of star topology.

See Also star topology

cascading style sheets (CSS)

A method for giving Web developers more control over how the pages of a Web site will look when displayed on a Web browser.

Overview

Cascading style sheets (CSS) is a standard from the World Wide Web Consortium (W3C) that gives Web developers control over design elements such as fonts and font sizes and allows two-dimensional overlapping and exact positioning of page elements. The CSS standard also makes it easier to globally change the style and appearance of a Web site without having to change elements on every page.

Implementation

Hypertext Markup Language (HTML) was designed for logical communication of linked information without much regard for its style or format, and it was not designed to provide a high degree of control over how that information is laid out on a page. Using CSS, a Web developer can control the appearance of an entire Web site, or a portion of it, using a single HTML page called a style sheet. The genius of CSS is that it separates the content of the page (formatted in HTML) from the page layout (defined in the style sheet using CSS).

Style sheets define the functions of different HTML tags on your site's Web pages and allow you to make global changes to your site's style by changing a single entry on a style sheet. Web pages then link to style sheets using a <LINK> tag.

For example, you can use a style sheet to define the <H1> tag as representing green, 18-point, Arial font text, and you can then apply this style to the entire site or a portion of it. Cascading style sheets involve the operation of several levels of style sheets that provide control over how an element on an HTML document is placed. CSS applies these settings in the following order:

Issues

The main factor that has prevented CSS from being widely implemented on most Web sites is that neither Microsoft Internet Explorer nor Netscape Navigator fully supports all aspects of the CSS standard. Thus, a CSS-enabled site may look one way in Internet Explorer and another way in Netscape, and neither may be what the site designer intended. One Web browser that fully implements the CSS standard is Opera, developed by Hakon Lie, who has been involved in the W3C.

For More Information

You can find the W3C standard for CSS version 2 at www.w3c.org/Style.

See Also Hypertext Markup Language (HTML)

Cat5 cabling

Stands for Category 5 cabling, the most common grade of unshielded twisted-pair (UTP) cabling used for structured wiring in commercial buildings.

See Also Category 5 (Cat5) cabling

Cat5e cabling

Stands for enhanced Category 5, a form of Category 5 (Cat5) cabling that supports higher speeds.

See Also enhanced Category 5 (Cat5e) cabling

Cat6 cabling

Stands for Category 6 cabling, the proposed next step up from enhanced Category 5 (Cat5e) cabling.

See Also Category 6 (Cat6) cabling

Cat7 cabling

Stands for Category 7 cabling, a still-hypothetical next step up from the proposed Category 6 (Cat6) cabling.

See Also Category 7 (Cat7) cabling

catalog

The top-level organizational structure for the Indexing service in Microsoft Windows 2000, Windows XP, and Windows .NET Server.

Overview

The catalog contains the master index and other persistent indexes. The Index Server catalog is located by default in the directory %systemdrive%\inetpub\catalog.wci, but this can be overridden during installation. The maximum size of the catalog for Index Server is 40 percent of the size of the documents being indexed (the corpus), so it is important when installing Index Server to locate the catalog on a drive with sufficient free space. For example, if you will be indexing 10 gigabytes (GB) of documents, you will need about 4 GB of space for locating your catalog.

Notes

An Indexing service query can span only one catalog at a time, so do not create multiple catalogs unless you want to completely separate the indexing of their documents-for example, if you are hosting Web sites for multiple companies on your server.

If you are hosting more than one virtual server on a Microsoft Internet Information Services (IIS) machine, and these virtual servers represent different companies, you might want to create multiple catalogs for the Indexing service, one for each virtual server. Each catalog will then be used for indexing a specific virtual server, and queries based on a catalog will return only results for content on the associated virtual server.

Category 1 (Cat1) cabling

The lowest grade of unshielded twisted-pair (UTP) cabling.

Overview

Category 1 (Cat1) cabling was designed to support analog voice communication only. Cat1 cabling was used prior to 1983 for wiring installations of analog telephone systems, otherwise known as the Plain Old Telephone Service (POTS). The electrical characteristics of Cat1 cabling make it unsuitable for computer networking purposes, and it is never installed as premise wiring for structured cabling installations. Instead, all premise wiring should use either Category 3 (Cat3) cabling, Category 4 (Cat4) cabling, or Category 5 (Cat5) cabling, with Cat5 or enhanced Category 5 (Cat5e) cabling preferred for all new installations.

See Also cabling ,premise cabling ,structured wiring

Category 2 (Cat2) cabling

The second-lowest grade of unshielded twisted-pair (UTP) cabling.

Overview

Category 2 (Cat2) cabling was designed to support digital voice and data communication. Cat2 cabling was capable of data transmissions up to 4 megabits per second (Mbps). It was used primarily in the installation of premise wiring for legacy Token Ring networks from IBM. The electrical characteristics of Cat2 cabling make it unsuitable for most networking purposes today, thus it is no longer installed as premise wiring. Instead, all premise wiring today should use only Category 3 (Cat3) cabling, Category 4 (Cat4) cabling, or Category 5 (Cat5) cabling, with Cat5 or enhanced Category 5 (Cat5e) cabling preferred for all new installations.

See Also cabling ,premise cabling ,structured wiring

Category 3 (Cat3) cabling

The third-lowest grade of unshielded twisted-pair (UTP) cabling.

Overview

Category 3 (Cat3) cabling was designed to support digital voice and data communication at speeds up to 10 megabits per second (Mbps). It uses 24-gauge copper wires in a configuration of four twisted-pairs enclosed in a protective insulating sheath. Cat3 cabling is the lowest grade of UTP cabling that can support standard 10BaseT types of Ethernet networks and was often used for legacy 4-Mbps Token Ring installations.

Cat3 cabling still has a significant installed base in older buildings, and for basic 10BaseT Ethernet purposes, it is often cheaper to use existing Cat3 cabling than to upgrade to Category 5 (Cat5). Installing higher-grade cabling for backbone cabling in vertical rises and elevator shafts can extend the life of work areas that still use Cat3 cabling. However, if greater speeds are required at users' workstations, the best solution is to rewire the work areas using Cat5 cabling or enhanced Category 5 (Cat5e) cabling.

The following table summarizes the electrical characteristics of Cat3 cabling at different frequencies, which correspond to different data transmission speeds. Note that attenuation increases with frequency, while near-end crosstalk (NEXT) decreases.

Cat3 Cabling Characteristics

Characteristic

Value at 10 MHz

Value at 16 MHz

Attenuation

27 decibels (dB)/1000 feet

36 dB/1000 feet

NEXT

26 dB/1000 feet

23 dB/1000 feet

Resistance

28.6 ohms/1000 feet

28.6 ohms/1000 feet

Impedance

100 ohms ( 15%)

100 ohms ( 15%)

Capacitance

18 pF/feet

18 pF/feet

See Also cabling ,Category 5 (Cat5) cabling enhanced Category 5 (Cat5e) cabling, premise cabling, structured wiring

Category 4 (Cat4) cabling

The grade of unshielded twisted-pair (UTP) cabling just below standard Category 5 (Cat5) cabling.

Overview

Category 4 (Cat4) cabling was designed to support digital voice and data communication at speeds up to 16 megabits per second (Mbps). It uses 22-gauge or 24-gauge copper wires in a configuration of four twisted-pairs enclosed in a protective insulating sheath. Cat4 cabling can support standard 10BaseT types of Ethernet networks. It was also commonly used in older 16-Mbps Token Ring installations.

Cat4 cabling still has some installed base in older buildings where it is often cheaper to use the existing cabling than to upgrade to newer grades. Installing higher-grade cabling for backbone cabling in vertical rises and elevator shafts can extend the life of work areas that still use Cat4 cabling. However, if greater speeds are required at users' workstations, the best solution is to rewire the work areas using Cat5 cabling or enhanced Category 5 (Cat5e) cabling.

The following table summarizes the electrical characteristics of Cat4 cabling at different frequencies, which correspond to different data transmission speeds. Note that attenuation increases with frequency, while near-end crosstalk (NEXT) decreases.

Cat4 Cabling Characteristics

Characteristic

Value at 10 MHz

Value at 20 MHz

Attenuation

20 decibels (dB)/1000 feet

31 dB/1000 feet

NEXT

41 dB/1000 feet

36 dB/1000 feet

Resistance

28.6 ohms/1000 feet

28.6 ohms/1000 feet

Impedance

100 ohms ( 15%)

100 ohms ( 15%)

Capacitance

18 pF/feet

18 pF/feet

See Also cabling ,Category 5 (Cat5) cabling enhanced Category 5 (Cat5e) cabling, premise cabling, structured wiring

Category 5 (Cat5) cabling

The most common grade of unshielded twisted-pair (UTP) cabling used for structured wiring in commercial buildings.

Overview

Category 5 (Cat5) cabling was designed to support digital voice and data communication at speeds up to 100 megabits per second (Mbps). It uses 22-gauge or 24-gauge copper wires in a configuration of four twisted-pairs enclosed in a protective insulating sheath. It is still the highest official grade of UTP cabling currently recognized by the Electronic Industries Alliance (EIA) and Telecommunications Industry Association (TIA), although proposals have been made for higher Category 6 (Cat6) and Category 7 (Cat7) grades.

Cat5 cabling is the standard grade of UTP cabling for common networking architectures including 10BaseT Ethernet, Fast Ethernet, and 1000BaseT Gigabit Ethernet (GbE) over copper. Cat5 cabling typically makes up over 80 percent of the wiring in today's corporate network. Its continuing popularity in high-speed networks is because fiber-optic cabling is still about twice as expensive to deploy as Cat5 cabling. Because of its superior electrical characteristics, Cat5 cabling is recommended for all new structured wiring installations as well as for upgrading existing premise wiring to support higher-speed networks.

The following table summarizes the electrical characteristics of Cat5 cabling at different frequencies, which correspond to different data transmission speeds. Note that attenuation increases with frequency, while near-end crosstalk (NEXT) decreases.

Cat5 Cabling Characteristics

Characteristic

Value at 10 MHz

Value at 100 MHz

Attenuation

20 decibels (dB)/1000 feet

22 dB/1000 feet

NEXT

47 dB/1000 feet

32.3 dB/1000 feet

Resistance

28.6 ohms/1000 feet

28.6 ohms/1000 feet

Impedance

100 ohms ( 15%)

100 ohms ( 15%)

Capacitance

18 pF/feet

18 pF/feet

Structural return loss

16 dB

16 dB

Delay skew

45 nanoseconds (ns)/100 meters

45 ns/100 meters

Marketplace

There are a vast number of different brands of Cat5 cabling on the market today. One estimate is that there are over 150 different vendors of such cabling. Not all Cat5 cabling is alike, and before undertaking a costly large-scale deployment of structured wiring, the enterprise architect should carefully investigate and compare the different brands.

Notes

For typical installations of Ethernet and Fast Ethernet, Cat5 cables in work areas should be no more than 300 feet (90 meters) long, and Cat5 patch cords should be no longer than 33 feet (10 meters). Check the Ethernet specifications for exact lengths permitted.

Many vendors offer an enhanced Cat5 (Cat5e) cabling grade with electrical characteristics exceeding those of standard Cat5. Cat5e cabling typically supports data transmission up to frequencies of 350 MHz, and new standards are under development to allow even higher data transmission frequencies. Cat5e networking is recommended for Gigabit Ethernet (GbE) over copper, but properly installed Cat5 cabling should work in most GbE setups. For best performance of GbE networks, however, use Cat5e or Cat 6 cabling whenever possible.

There is widespread agreement that Cat5 cabling will not be able to support networks beyond GbE, such as the 10 GbE architecture currently under development. Such ultra-high speed networks will likely work only with fiber and will not support copper.

See Also cabling ,enhanced Category 5 (Cat5e) cabling ,premise cabling ,structured wiring

Category 6 (Cat6) cabling

The proposed next step up from enhanced Category 5 cabling (Cat5e).

Overview

Category 6 (Cat6) is a proposed Electronic Industries Association/Telecommunications Industry Association (EIA/TIA) cabling standard that represents the next step up from Cat5 and Cat5e cabling. The following table shows the current draft standard for Cat6 cabling characteristics.

Proposed Cat6 Cabling Characteristics

Characteristic

Value at 250 MHz

Attenuation

19.9 decibels (dB)/1000 feet

NEXT

44.3 dB/1000 feet

Impedance

100 ohms ( 15%)

Return loss

20.1 dB

Delay skew

45 nanoseconds (ns)/100 meters

PS-NEXT

42.3 dB

Implementation

Great care must be taken when installing Cat6 cabling in order to have it achieve its design goals because poorly installed Cat6 cabling may offer only Cat5 performance. To get best performance out of Cat6 cabling for high-speed networking, be sure to follow the following guidelines:

Issues

Despite the formation in 1999 of a TIA task force to develop an official standard for a proposed Cat6 cabling, this unshielded twisted-pair (UTP) cabling standard remains to be ratified. The inherent engineering difficulties of standardizing cabling transmission characteristics for transmissions at 250 MHz and above, coupled with the fact that many cabling vendors have released their own "Category 6 or better" cabling, has led to some confusion in the marketplace. A factor that has slowed the development of Cat6 standards was the successful implementation of 1000BaseT Gigabit Ethernet (GbE) over Cat5 cabling, which relaxed the immediate need for a higher Cat6 class of cable and slowed the momentum of the Cat6 standards process. Cat6 thus currently appears as a solution in search of a problem, and the emergence of 10 Gigabit Ethernet (10 GbE) may have little impact on this situation because 10 GbE is envisioned as a fiber-only architecture.

At present Cat6 cabling solutions are essentially "channel solutions," meaning that their successful implementation depends on purchasing cabling components (such as cabling, patch panels, jacks, and wall plates) from a single vendor. Until an official Cat6 standard emerges, networking architects are recommended to use such channel solutions from a singling cabling vendor. In fact, some believe that "mix and match" cabling solutions for Cat6 will never be achieved due to the careful tuning of components that must be performed to make such systems work.

Notes

Existing cable testing equipment will not be able to evaluate Cat6 cabling because Cat6 not only includes additional parameters that must be measured but also specifies at least 10 dB greater precision in measuring existing cabling transmission characteristics over that achieved by Cat5e test equipment.

Some experts believe that it may be possible in the future to run 10 gigabits per second (Gbps) over Cat6 cabling at distances up to 330 feet (100 meters). If this is the case, then Cat6 cabling may well serve as an alternate infrastructure solution to fiber for the emerging 10 GbE standard. Such uses of Cat6 cabling are likely to be restricted to niche applications such as switch-switch and switch-server interconnects and within some types of storage area networks (SANs).

Another name for the proposed Cat6 cabling standard is Class E.

See Also 10GbE, cabling, enhanced Category 5 (Cat5e) cabling, premise cabling, structured wiring

Category 7 (Cat7) cabling

A still-hypothetical next step up from the proposed Category 6 (Cat6) cabling.

Overview

There is as yet no official Telecommunications Industry Association (TIA) standard for unshielded twisted-pair (UTP) cabling above Cat6, and Cat6 itself is still under consideration and has not been ratified as a standard. Nevertheless, many cabling vendors are offering "Category 7 cabling solutions" that exceed the specifications of Cat6. Such marketing should be taken with a grain of salt, as they do not represent true Cat7 standards, but such "channel solutions" involving cabling system elements purchased from a single vendor can provide significantly better performance than standard enhanced Category 5 (Cat5e) cabling. It is likely that when a true Cat7 standard emerges, it may require the replacement of the ubiquitous RJ-45 connector, which is a weak point in the transmission architecture for UTP cabling. Unfortunately, this means that existing networking equipment such as switches and routers may not be able to support Cat7.

While the Electronic Industries Association/Telecommunications Industry Association (EIA/TIA) has currently abandoned efforts to standardize Cat7, standards efforts are underway on the international scene through the efforts of the International Standards Organization (ISO) and International Electrotechnical Commission (IEC).

Notes

Another name for proposed Cat7 cabling is Class F cabling.

See Also cabling ,Category 6 (Cat6) cabling premise cabling, structured wiring

CBCP

Stands for Callback Control Protocol, a protocol that enables callback for establishing Point-to-Point Protocol (PPP) connections.

See Also Callback Control Protocol (CBCP)

CBQ

Stands for class-based queuing, an emerging technology for WAN traffic management.

See Also class-based queuing (CBQ)

CBT

Stands for Core-Based Trees, a multicast routing protocol.

See Also Core-Based Trees (CBT)

CDDI

Stands for Copper Distributed Data Interface, a form of Fiber Distributed Data Interface (FDDI) deployed over copper cabling instead of fiber.

See Also Copper Distributed Data Interface (CDDI)

CDE

Stands for Common Desktop Environment, a graphical user interface (GUI) or desktop environment developed for UNIX systems.

See Also Common Desktop Environment (CDE)

CDF

Stands for Channel Definition Format, an open standard created by Microsoft Corporation for Microsoft Internet Explorer version 4 (and proposed as a standard to the World Wide Web Consortium) that defines a "smart pull" technology for webcasting information to users' desktops.

See Also Channel Definition Format (CDF)

CDF file

Text files used for creating Active Channels, Active Desktop items, and channel screen savers for managed webcasting of content to users' desktops.

Overview

CDF files are based on the Channel Definition Format (CDF) standard. CDF files provide a mechanism for allowing users to select the content they want to download from a Web site, and they let administrators schedule content for delivery to users' desktops.

CDF files are used to convert existing Web sites into Active Channels without the need to change the existing site in any way. You simply create a CDF file using a text editor such as Microsoft Notepad and include it in your site. This will allow the content of the site to be webcast to users' browsers. The CDF file must be saved with the extension .cdf, and a link on your site should point to this file so that users can subscribe to the channel.

A typical CDF file defines a channel hierarchy for the different Web sites making up the Active Channel. This channel hierarchy contains a table of contents for webcasting the content and consists of a top-level channel, subchannels, and actual content items (Web pages). The simplest format for a CDF file is a list of Uniform Resource Locators (URLs) that point to specific Web pages in the site. More advanced CDF files can contain information such as the following:

The syntax of advanced CDF file items is based on the Extensible Markup Language (XML), an open specification that provides extensibility to standard Hypertext Markup Language (HTML) files. More than one CDF file can be created for a site, allowing users to subscribe to information in different fashions. For example, a news site can have separate CDF files for news, sports, and weather subscriptions.

Notes

For specific information on the syntax of CDF files and how to create them, refer to the Microsoft Internet Client software development kit (SDK).

Channels in Active Channel enable personalized delivery of Web content using Web applications designed for Internet Information Service (IIS) for Windows 2000. Active Server Pages (ASP) can be used for dynamically generating personalized CDF files for users. Cookies can also be used for dynamically generating customized CDF files for users. These CDF files can be customized on the basis of preferences that a user specifies on an HTML form prior to subscribing to the channel.

See Also Channel Definition Format (CDF)

CDFS

Stands for CD-ROM File System, a file system designed for read-only CD-ROM media.

See Also CD-ROM File System (CDFS)

CDMA

Stands for Code Division Multiple Access, a second- generation (2G) digital cellular phone technology that uses spread-spectrum techniques, popular in the United States and some other parts of the world.

See Also Code Division Multiple Access (CDMA)

CDMA2000

A proposed third-generation (3G) upgrade for existing Code Division Multiple Access (CDMA) cellular telephone systems.

Overview

CDMA2000 was developed by the Telecommunications Industry Association (TIA) and is part of the International Mobile Telecommunications 2000 (IMT-2000) initiative of the International Telecommunication Union (ITU). CDMA2000 will boost the bandwidth of existing cdmaOne cellular systems to 2 megabits per second (Mbps), making global broadband wireless communications a reality.

Because the proposed CDMA2000 upgrade includes only a small portion of the overall wireless communication market, the IMT-2000 initiative also includes proposed upgrades to Time Division Multiple Access (TDMA) systems such as Global System for Mobile Communications (GSM). A competing upgrade for TDMA systems is General Packet Radio Service (GPRS), which is closer to implementation than CDMA2000 and might therefore win more initial support than CDMA2000.

The term CDMA2000 1x is commonly used to describe various interim CDMA2000 systems that use existing IS-95a base stations to provide 2.5G cellular services. CDMA2000 1x systems expect to achieve data transmission speeds of between 144 kilobits per second (Kbps) and 307 Kbps and are therefore classed as 2.5G cellular services instead of the much faster 3G services envisioned by IMT-2000. The proposed 3G system Wideband CDMA (W-CDMA) is comparable to CDMA2000 2x , meaning the 3G version of CDMA2000.

The CDMA Development Group is also promoting a different CDMA2000 upgrade called High Data Rate (HDR) CDMA2000 1x . This platform is based on the American National Standards Institute (ANSI) IS-95c standard and is viewed as an alternative upgrade path from CDMAone toward 3G. It involves a hardware upgrade using chipsets produced by QUALCOMM (the originators of CDMA) and may provide data speeds up to 2.4 Mbps, even better than the 2 Mbps speeds anticipated by W-CDMA. In some respects HDR may be superior to W-CDMA, the 3G version of CDMA being proposed by the ITU in its IMT-2000 initiative. Specifically, while W-CDMA is expected to provide 2 Mbps service only for stationary users, and much slower speeds for mobile and roaming users, HDR is intended to provide the same 2.4 Mbps speed for all users whether mobile or stationary. However, W-CDMA has the advantage of being a proposed standard for implementing compatible systems throughout the world. Only time will tell which system achieves market dominance.

For More Information

Visit the CDMA Development Group at www.cdg.org

See Also 3G, cellular communications, cdmaOne, Code Division Multiple Access (CDMA)

cdmaOne

The commercial name for the Code Division Multiple Access (CDMA) cellular communications system used in North America and parts of Asia.

See Also Code Division Multiple Access (CDMA)

CDN

Stands for content delivery network, a method for efficiently pushing out content over the Internet to users.

See Also content delivery network (CDN)

CDO

Stands for Collaboration Data Objects, a collection of Component Object Model (COM) objects that allow developers to create Microsoft Internet Information Services (IIS) Web applications that send and receive electronic mail.

See Also Collaboration Data Objects (CDO)

CDP

Stands for Content Delivery Provider, a company that builds and operates a content delivery network (CDN).

See Also content delivery network (CDN)

CDPD

Stands for Cellular Digital Packet Data, a type of packet-switched data transmission network operating as an overlay for a cellular communications system.

See Also Cellular Digital Packet Data (CDPD)

CD-ROM File System (CDFS)

A file system designed for read-only CD-ROM media.

Overview

CD-ROM File System (CDFS) is an International Organization for Standardization (ISO) standard (ISO 9660) for a read-only formatting standard for CD-ROM media. CDFS provides the same kind of file and directory management for CD-ROM devices that the file allocation table (FAT) and NTFS file systems (NTFS) do for hard disks.

CDFS is implemented on the Microsoft Windows 95, Windows 98, Windows Millennium Edition (Me), Windows NT, Windows 2000, Windows XP, and Windows .NET Server platforms. On 32-bit Windows systems, CDFS uses a 32-bit protected-mode driver that replaces the 16-bit real-mode Microsoft CD-ROM Extension (MSCDEX) driver that was used in the legacy 16-bit Windows and MS-DOS operating system platforms. In Windows 95 and Windows 98, the file system driver that supports CDFS is called Cdfs.vxd, and in Windows NT, Windows 2000, Windows XP, and Windows .NET Server, it is called Cdfs.sys.

CDFS is optimized for reading compact discs that have a standard data block size of 2048 bytes (2 KB). The Microsoft implementation of CDFS includes a dynamic, protected-mode cache pool for caching CD-ROM data to improve read performance. This allows CDFS to read ahead to ensure that playback of multimedia content from CDs is smooth and seamless. On Windows 95 OEM Service Release 2 (OSR2), Windows 98, Windows Me, Windows NT, Windows 2000, Windows XP, and Windows .NET Server platforms, CDFS includes a number of enhancements over the original version of CDFS for Windows 95, such as

CDFS does have several limitations compared to disk file systems such as FAT and NTFS, namely:

CDFS is now considered a legacy format and is being replaced by the industry-standard Universal Disk Format (UDF), the new standard for read-only disk media.

Notes

Using Services for Macintosh, you can create an Apple Macintosh-accessible volume on a CDFS volume by following the same steps you would use to make an NTFS volume accessible to Macintosh clients. Of course, the CDFS volume has one difference: it is read-only.

See Also file system ,Universal Disk Format (UDF)

CDSL

Stands for Consumer DSL, a broadband transmission technology based on Digital Subscriber Line (DSL) technology.

See Also Consumer DSL (CDSL)

cell (ATM)

A 53-byte packet of data, the standard packet size used by Asynchronous Transfer Mode (ATM) communication technologies.

Overview

Cells are to ATM technologies what frames are to Ethernet networking. In other words, they form the smallest element of data for transmission over the network.

Cell in ATM. Details of an ATM cell.

ATM cells are standardized at a fixed-length size of 53 bytes to enable faster switching than is possible on networks using variable-packet sizes (such as Ethernet). It is much easier to design a device to quickly switch a fixed-length packet than to design a device to switch a variable-length packet. (Switching a fixed- length packet is easier because the device knows in advance the packet's exact length and can anticipate the exact moment at which the last portion of the packet will be received. With variable-length packets, the device must examine each packet for length information.) Using fixed-length cells also makes it possible to control and allocate ATM bandwidth more effectively, making support for different quality of service (QoS) levels for ATM possible.

The functions of information stored in the 5-byte header of an ATM cell include the following:

Two kinds of header formats are used in ATM cells:

Notes

Why a 48-byte data payload for ATM cells? This is the result of a trade-off between larger 64-byte payloads that contain more data but take longer to package and unpackage- and are therefore not suitable for real-time transmissions such as voice or multimedia-and shorter 32-byte payloads that provide better real-time transmission but are inefficient for larger amounts of data. By compromising at a 48-byte payload size, ATM has good transmission capabilities for both voice and data communication, providing efficient packet transfer with low latency.

See Also Asynchronous Transfer Mode (ATM)

cell (cellular communications)

In wireless communication technologies, the geographical region that is covered by a transmission facility.

Overview

The term cell is most often used in reference to cellular phone technology, but it can also be used in reference to the coverage areas for transmission of cordless telephones, satellite transmissions, wireless local area networks (LANs), packet radio, and paging technologies.

Cells range in size from a few dozen feet to thousands of miles in diameter, depending on the technology being used, the power of the transmission station, and the terrain topography. The following table summarizes typical cell size ranges for different wireless communication technologies. These figures are only approximate because wireless technologies are constantly evolving.

Satellite-based systems have by far the largest cell sizes and are rapidly increasing in popularity. Cellular phone technologies in rural areas typically use cells with a radius of 6 to 30 miles (10 to 50 kilometers), while cells in urban areas range in size from 0.6 to 6 miles (1 to 10 kilometers). For highly dense urban areas, cell sizes as small as 330 feet (100 meters) can be used, especially in high-tier Personal Communications Devices (PCD) cellular technologies.

Cell Radius Measures by Technology

Wireless Technology

Cell Radius

Wireless LANs

10 to 100 meters

Cellular telephone

0.1 to 50 kilometers

PCD

0.1 to 1 kilometer

Satellite-based

1000 kilometers or more

Notes

When a mobile caller using a cell phone passes from one cell to another, the cellular phone system transfers the call to the system servicing the adjacent cell, a process called roaming.

See Also cellular communications ,wireless networking

Cellular Digital Packet Data (CDPD)

A type of packet-switched data transmission network operating as an overlay for a cellular communications system.

Overview

Cellular Digital Packet Data (CDPD) is a specification for overlaying digital data transmissions on the existing circuit-switched Advanced Mobile Phone Service (AMPS) analog cellular phone service. CDPD was developed by IBM together with a consortium of Regional Bell Operating Companies and other organizations to leverage the existing installed base of AMPS cellular equipment in the United States to provide low-cost, packet-switched data services. CDPD was first offered in 1994 by Bell Atlantic Mobile.

Uses

CDPD is typically used to provide wireless access to public packet-switched networks such as the Internet so that mobile users can access their e-mail and other services. Multiple users can share the same channel; the user's modem determines which packets are destined for the user's machine. CDPD also supports IP multicasting and is an open standard based on the Open Systems Interconnection (OSI) reference model for networking.

Architecture

CDPD makes use of idle times between calls in cellular phone network channels for interleaving packets of digital data. In other words, CDPD makes use of the "bursty" nature of typical voice transmission on the AMPS cellular system. Voice communication has gaps or pauses where packet data can be inserted and transmitted without interfering with the communication taking place between customers.

CDPD uses the Reed-Solomon forward-error-correcting code to encode each block or burst of data sent, and includes built-in RC4 encryption to ensure security and privacy of the transmitted data. CDPD is also based on the industry standard Internet Protocol (IP), allowing data to be transmitted to and from the Internet.

Although CDPD supports data transmission rates of 19.2 kilobits per second (Kbps) and higher, actual data throughput is usually around 9.6 Kbps. This is because of the large overhead added by CDPD to each data block transmitted. This overhead is designed to ensure that communications are reliable and to maintain synchronization between the modems at each end of the transmission. In addition, a color code is added to every data block to detect interference resulting from transmissions on the same channel from neighboring cell sites.

Implementation

A typical implementation of CDPD consists of three components:

Marketplace

In the United States, the main providers of CDPD services are AT&T Wireless and Verizon Wireless. CDPD is also supported by several carriers in Canada and by AirData in New Zealand. CDPD is not widely deployed as a cellular data transmission technology, and coverage in the United States is spotty even in urban areas.

For More Information

You can find the CDPD Forum at www.cdpd.org

See Also cellular communications ,wireless networking

cellular communications

A group of technologies that support roaming cell-based wireless communications.

Overview

Common to all forms of cellular communications is the concept of the cell. Instead of using one extremely powerful transmission to provide coverage for a geographical area (for example, a city, state, region, or country), the area is divided into a series of overlapping smaller areas called cells. Each cell has a relatively low-power base station that provides coverage for users within that cell, and when a user moves (roams) from one cell to another, the first base station seamlessly hands off servicing of the user to the second base station and the user experiences no interruption in communication.

Cellular communications. How a cellular phone system works.

Dividing the coverage area into many cells makes cellular communications systems more complicated than systems that use a single high-powered base station. Complex functions such as call setup and tear down, call authorization, call handoff, routing of call traffic, and call billing must operate seamlessly as users move between cells, and they require complex technology to implement. These functions are provided by connecting groups of base stations to a mobile switching center (MSC), which coordinates the activities of the base stations and connects them to the Public Switched Telephone Network (PSTN) so wireless users can call wireline users and vice versa.

Communications channels also need to be allocated to cells in such a way that no two adjacent cells use the same set of channels. This is necessary to ensure that signals from one base station do not interfere with those from base stations in adjacent cells. Repeating patterns of cells are used to optimize coverage of an area while maintaining the maximum number of available channels per cell. For example, in a typical cellular system, if you travel in a straight line every third cell utilizes the same set of frequencies.

Cells can also vary considerably in size. Because each cell can only support a certain number of users, cells in dense urban areas are much smaller than those in sparsely inhabited rural areas, and when population increases cells may need to be split to continue to provide adequate coverage. All this makes cellular communications complicated to implement, which explains why the technology took so many years to be widely deployed after the it was first conceived. The main advantage of such systems, however, is that, because cells are relatively small, the mobile client (cell phone or other device) does not need to be very powerful, which saves considerably on the size and the cost of the phone and has helped propel the widespread use and popularity of these systems.

History

The concept of a cellular phone system originated in 1947 at AT&T Bell Laboratories. AT&T first proposed a commercial cellular system to the Federal Communications Commission (FCC) in the late 1960s, and the FCC allocated the necessary frequency spectrum in 1974. A demonstration system was tested in Chicago in 1978, but the first actual cellular system was deployed in Japan in 1979 by the Nippon Telephone and Telegraph Company. This was followed by Europe in 1981, and finally in 1983 AT&T began deploying Advanced Mobile Phone Service (AMPS), the first nationwide cellular system in the United States.

AMPS was a first-generation (1G) analog cellular phone system that used frequency modulation for voice transmission and frequency-shift keying (FSK) for transmission of signaling information. AMPS uses channels within the 800 megahertz (MHz) frequency band of the electromagnetic spectrum, and channel access is provided by using Frequency Division Multiple Access (FDMA) as the media access method. AMPS achieved widespread implementation across the United States in the 1980s and is still widely used.

Another wave of cellular communications systems was developed in the 1990s and is still widely deployed. These second-generation (2G) systems differ from AMPS in being digital rather than analog in nature, and they can support not just voice but also data transmission, typically at 9.6 to 19.2 kilobits per second (Kbps). Several competing digital cellular systems have evolved and have become widely deployed:

Issues

A major concern that has been receiving media attention lately is the safety of using cellular phones. While most agree that using a cellular phone while driving can increase the chances of an accident (and some civic and municipal governing bodies have passed laws regulating use of cellular phones while driving), scientists continue to debate whether other health hazards might be associated with the long-term use of cell phones. A particular concern is the possible link between cell phone use and brain cancer, particularly among children whose brains are still forming. Cell phones transmit microwave energy through their antennas, and microwaves have a known heating effect (think of a microwave oven, for example). When a cell phone is held next to the ear, some of the microwave energy penetrates into the brain, and while the FCC has mandated emission standards for cellular phones to keep these emissions below dangerous levels, some researchers believe that long-term exposure to even low-level microwave radiation may be harmful to the brain and other organs, particularly in children. On the other hand, many researchers believe that there is no conclusive link between brain cancer and cell-phone use, and in general such associations between cancer and environment factors are difficult to prove (consider how long it took to resolve the controversy over whether cigarettes caused lung cancer). The American Medical Association and other bodies continue to call for further study of these issues, but it will likely take years for studies to produce any significant results. Some governing bodies are already taking steps, however, such as the United Kingdom, which has mandated that mobile telephone handsets must now come with leaflets warning of potential health risks to children who use these devices over a prolonged period.

Impact

Cellular communications have revolutionized business and personal communications worldwide. About one-third of Americans now own cell phones, and this is growing at an annual rate of 25 percent. Use of cell phones in Europe and Asia is even higher on a percentage basis, and some analysts predict that by 2005 there will be more than 1.25 billion cell phones and other cellular communications devices used around the world.

Cell phones have helped catalyze the e-business revolution by providing employees with 24x7 connectivity with the office-something desirable from a management point of view but debatable in terms of the quality of life for workers. Using data-enabled cell phones and wireless Personal Digital Assistants (PDAs), workers can perform tasks such as sending and receiving e-mail, checking inventory and ordering products, reboot servers, and perform other essential tasks to keep an e-business operating. Nonbusiness uses of data-enabled cell phones including browsing the Web, checking weather reports, downloading news headlines, confirming airline reservations, checking stock quotations, and many other uses. Although many of these uses are exciting, most data operations are still tedious over slow 2G cellular systems, and the real promise of cellular Internet access will not be realized until 3G comes into full operation in the latter part of this decade.

Prospects

The current 2G cellular systems will be replaced over the next few years by broadband cellular systems that support much higher rates of data transmission than can now be achieved. Proposed 3G systems will support data transmission as fast as 2 megabits per second (Mbps) and include

Because 3G technologies are not expected to be deployed until 2003 (or more likely 2005), some carriers are implementing interim 2.5G systems to provide increased data rates over 2G until 3G becomes a reality. Some 2.5G systems starting to be deployed include

For More Information

For the latest news about the cellular industry, visit the Cellular Telecommunications & Internet Association's (CTIA) World of Wireless at www.wow-com.com

See Also 2G, 2.5G, 3G, broadband wireless communications, CDMA2000, Code Division Multiple Access (CDMA), Enhanced Data Rates for Global Evolution (EDGE), General Packet Radio Service (GPRS), Global System for Mobile Communications (GSM), Personal Communications Services (PCS), Time Division Multiple Access (TDMA), wireless networking

central office (CO)

A telco switching facility.

Overview

The central office (CO) provides access to the Plain Old Telephone Service (POTS), leased lines, and other services that a telco offers its customers in a given geographical area (usually a dozen square miles or so). The CO contains the Class 5 switching equipment that connects telephone subscribers to both local and long-distance phone services. A telco typically has one CO servicing several dozen square miles in urban areas, so in large cities there may be many COs for each telco.

A typical CO may look like a fortress built to withstand an earthquake or any other natural disaster. Building standards for COs are high because of the importance of the communications infrastructure to a nation's economic health and safety. Banks of batteries and diesel generators provide backup power in case of blackouts so that phone communication will not be disrupted.

Multitudes of twisted-pair copper telephone lines from customer premises usually enter the building through the underground cable vault. These twisted-pair lines are grouped into bundles of thousands of lines, forming large cables 3 to 4 inches (7.5 to 10 centimeters) in diameter. The cables have grounding mesh to provide a drain for unwanted electrical surges and tough polyvinyl chloride (PVC) insulating jackets that are pressurized to prevent water from seeping in at cable junctions. Steel racks organize these cables as they enter the cable vault.

From the vault, the cables snake their way to the main cross-connect grid. It is in these steel-frame grids that all the individual twisted-pairs fan out and connect through feeders to the main switching equipment. The importance of the feeders is that they allow any incoming twisted-pair line to connect to virtually any switching bank. This makes it possible for customers to move to a different part of the city and maintain their old telephone number at their new location. It also allows for redundancy: if a switch fails, a CO technician can rewire the feeder blocks quickly and easily. The main switches are then used to route calls to other local subscribers or to a long-distance telecommunications carrier such as AT&T or MCI WorldCom. In the United States, these Class 5 telephone switches are usually Basic-5ESS switches, also called AT&T basic rate switches.

Subscribers are connected to their local CO through a segment of wiring called the local loop. This wiring is typically copper, but telcos lay fiber to the building for customers requiring high-speed services not supported by copper lines.

Finally, a telco may have dozens of COs in a dense urban area, all interconnected using cross-links and redundant switches. Each CO services subscribers within a specific geographical area and manages voice and data traffic in that area. When a call is made from a customer over the local loop to the CO, the call is either switched to another circuit within the same exchange (for local calls) or switched to a trunk line joining the CO to a CO belonging to a different company, typically a long-haul carrier such as Sprint or AT&T. For business customers needing multiple telephone lines at their location, the carrier typically deploys a private branch exchange (PBX) at the customer premises.

Notes

Not all of a telco's switching and telecommunications equipment is located at a central office. There are recent trends where telcos have pushed out their ATM switching gear to within 500 feet (150 meters) of residential neighborhoods in pursuit of better-quality Digital Subscriber Line (DSL) connections. These remote stations shorten the copper DSL connections between customer premises and the provider's switching gear, and the remote Asynchronous Transfer Mode (ATM) concentrators are then connected to the COs using fiber.

In countries and regions other than the United States, a CO is often referred to as a public exchange.

See Also telco

Centrex

An acronym for Centr al Office Ex change Service, a business telephone service provided by telcos.

Overview

By using a Centrex instead of a Private Branch Exchange (PBX), a business can eliminate the necessity of having its own dedicated switching facilities at its customer premises. Centrex also eliminates the need for customers to upgrade to expensive new telephones because existing telephone lines and touch tone phones can be used with it. This frees the customer from the need to invest in the cost and management of customer premises equipment (CPE).

Centrex services partition the switching capabilities of the telco's central office (CO) equipment and allow a portion of these capabilities to be dedicated to a particular customer. In essence, the business customer is leasing dedicated switching facilities at the CO to enable a large number of employee telephones to be routed through a few telephone lines. All routing of calls to individual employee telephones takes place using the Centrex. Configuration changes can be performed at the CO instead of requiring technicians to visit the customer premises. This can save the cost of installing a local PBX at the customer premises.

Centrex can handle advanced communication features such as internal call handling, inbound and outbound call handling, and multiparty calling. Each individual connected can have customized calling features just as they can with a PBX. Maintenance is entirely the responsibility of the telco central office, which provides around-the-clock support.

Notes

Some carriers such as Pacific Bell Telephone Company also offer Integrated Services Digital Network (ISDN) as a Centrex service in addition to standard business ISDN lines.

See Also central office (CO) ,Private Branch Exchange (PBX) ,telco

certificate

Also called digital certificate, a technology for verifying the identity of the user or service you are communicating with.

See Also digital certificate

certificate authority (CA)

Any entity (individual, department, company, or organization) that issues digital certificates to verify the identity of users, applications, or organizations.

Overview

Before issuing a digital certificate to someone, the certificate authority (CA) must verify the user's identity according to a strictly established policy, which can involve face-to-face communication, examination of a driver's license with photograph, or another method of establishing a user's identity. When the user's identity has been verified, the certificate is issued to the user. This certificate can then be presented by the user as a "digital driver's license" to identify himself or herself during network transactions.

CAs can be trusted third parties such as the private companies VeriSign, CyberTrust, and Nortel Networks; or they can be established within your own organization using Microsoft Certificate Server. CAs can be stand- alone authorities with their own self-signed certificates (that is, they validate their own identity as a root CA), or they can be part of a hierarchy in which each CA is certified by the trusted CA above it (up to a root CA, which must always be self-certified).

For digital certificates to work as an identification scheme, both client and server programs must trust the CA. In other words, when a client program presents a certificate to a server program, the server program must be able to validate that the certificate was issued by a valid and trusted CA. Certificate authorities also maintain a certificate revocation list (CRL) of revoked certificates. Certificates issued by CAs expire after a specified period of time.

CAs are necessary for the functioning of a public key infrastructure (PKI), which is essential to the widespread acceptance and success of any public key cryptography system. Microsoft Windows 2000 and Windows .NET Server can use standard X.509 digital certificates to authenticate connections across unsecured networks such as the Internet and to provide single sign-on using smart card authentication systems.

For More Information

Visit VeriSign, Inc. at www.verisign.com

See Also digital certificate ,public key infrastructure (PKI)

certificate mapping

A feature of Microsoft Internet Information Server (IIS) version 4 and Internet Information Services (IIS) version 5 (for Windows 2000) and later that allows mapping between user accounts and digital certificates.

Overview

Certificate mapping is useful when an organization issues client certificates to users. Client certificates are digital certificates that verify the identity of client software (Web browsers) belonging to users. Client certificates are often used in situations in which mobile clients using laptops require secure access to a corporate intranet site.

Before users can be granted remote access to the corporate intranet, they must be authenticated by the Web server they are connecting to. IIS supports four kinds of Web authentication mechanisms:

Client certificates provide verification of identity, but certificate mapping associates a user's account with the user's client certificate and permits the user to log on to the network. The user typically utilizes a Web browser with SSL protocol to connect to a secure company Web site. The company Web server checks the Web browser's client certificate. If the certificate is valid, the user is automatically logged on using his or her user account without ever having to enter credentials and can access whatever intranet resources for which the account has permissions.

IIS allows two kinds of client certificate mappings:

Notes

Certificate mapping is also supported by Active Directory directory service in Microsoft Windows 2000, Windows XP, and Windows .NET Server operating systems. You can use the Active Directory Users and Computers administrative tool for this purpose.

See Also digital certificate

certificate request

A file containing an entity's identification information and public key that is submitted to a certificate authority (CA) in order to obtain a digital certificate.

Overview

A certificate request is a text file encoded using Base64 encoding. This text file is generated by an application in response to the entity's request for a key pair and digital certificate. The entity here refers to the individual, system, company, or organization requesting the certificate. The certificate request is then submitted to a CA to obtain a digital certificate for the entity.

The Key Manager utility in Internet Services Manager (the utility used to manage Microsoft Internet Information Services) can be used to generate a key pair and a standard public key cryptography standards (PKCS) #10 format certificate request file. The certificate request file is a simple text file that can be viewed with Microsoft Notepad. If this file is submitted to a public certificate authority, such as VeriSign, or to the company's own certificate authority, such as Microsoft Certificate Server, a standard X.509 format digital certificate will be granted in return.

See Also digital certificate ,public key infrastructure (PKI)

certificate revocation list (CRL)

A list, maintained by a certificate authority (CA), of digital certificates that have been issued and later revoked.

Overview

A certificate revocation list (CRL) is similar to lists of revoked credit card numbers that credit card companies used to give to vendors. The certificate authority makes the CRL publicly available so that users can determine the validity of any digital certificate presented to them.

Creating and maintaining a CRL is an essential ingredient in running a public key infrastructure (PKI) to support public key cryptography systems. Microsoft Certificate Server includes a Web-based utility called the Certificate Administration Log Utility that can be used to revoke certificates and maintain a CRL.

See Also digital certificate ,public key infrastructure (PKI)

Certified Technical Education Center (CTEC)

An education-delivery company, such as a school or training center, that is qualified by Microsoft Corporation for the delivery of Microsoft Official Curriculum (MOC) courseware.

Overview

Certified Technical Education Centers (CTECs) are one of Microsoft's main channels for training on Microsoft products and technologies. CTECs can deliver training in a variety of forms, including instructor-led, self- paced, customized, and online training. CTECs are one of the ways that Microsoft contributes to solutions addressing the shortage of skilled IT professionals worldwide.

Network professionals who want to become familiar with Microsoft operating systems, applications, and development platforms can take MOC courses offered by CTECs at various locations around the world. Microsoft CTECs are also a source for the best in self-paced training materials on Microsoft products and services.

For More Information

Visit the Microsoft CTEC site at www.microsoft.com/ctec.

See Also Authorized Academic Training Provider (AATP)

CGI

Stands for Common Gateway Interface, a mechanism by which a Web browser can request a Web server to execute an application.

See Also Common Gateway Interface (CGI)

Challenge Handshake Authentication Protocol (CHAP)

A standard form of challenge/response authentication protocol.

Overview

Challenge Handshake Authentication Protocol (CHAP) is a standard authentication protocol defined in RFC 1994. CHAP is one of several authentication schemes used by the Point-to-Point Protocol (PPP), a serial transmission protocol for wide area network (WAN) connections. Other authentication schemes supported by PPP include Password Authentication Protocol (PAP), Shiva Password Authentication Protocol (SPAP), and Microsoft Challenge Handshake Authentication Protocol (MS-CHAP). PAP is a widely implemented authentication protocol, but CHAP is more secure than PAP because CHAP encrypts the transmitted password and PAP does not. SPAP and MS-CHAP are vendor-specific implementations.

CHAP is an encrypted authentication scheme in which the unencrypted password is not transmitted over the network. A typical CHAP session during the PPP authentication process works something like this:

To guard against replay attacks, the challenge string is chosen arbitrarily for each authentication attempt. To protect against remote client impersonation, CHAP sends repeated, random interval challenges to the client to maintain the session.

Notes

CHAP is supported by the Routing and Remote Access (RRAS) service of Windows 2000 and Windows .NET Server as a way to allow non-Microsoft clients to dial in and receive authentication for a Remote Access Server (RAS) session, and to allow Microsoft RAS clients to connect to any industry-standard PPP server.

With Cisco routers, CHAP repeatedly challenges the connecting host every two minutes after the connection is established. This helps to prevent session hijacking by hackers on the network.

See Also authentication provider, challenge/response, Microsoft Challenge Handshake Authentication Protocol (MS-CHAP), Password Authentication Protocol (PAP), Point-to-Point Protocol (PPP)

challenge/response

A mechanism for securely authenticating users over a network.

Overview

Challenge/response provides a way of employing user credentials to negotiate a connection over a network without actually passing these credentials over the network. Challenge/response forms the basis of the Integrated Windows authentication method supported by Internet Information Services (IIS) on Microsoft Windows 2000, Windows XP, and Windows .NET Server (Integrated Windows authentication was previously called Windows NT Challenge/Response authentication in Internet Information Server [IIS] on Windows NT).

Implementation

The basic steps of challenge/response are straightforward and independent of the actual platform they are implemented on. Here are the steps in a typical challenge/response authentication session:

See Also authentication protocol ,hashing algorithm ,Integrated Windows Authentication

Change and Configuration Management

A set of features in Microsoft Windows 2000, Windows XP, and Windows .NET Server for managing user settings and installing applications.

Overview

Change and Configuration Management is included in Windows 2000, Windows XP, and Windows .NET Server to provide support for tasks such as

Change and Configuration Management is an umbrella term for two underlying Microsoft technologies that make these things possible. These two technologies are

See Also IntelliMirror

channel (Active Channel)

The delivery method in Active Channel, a technology for Microsoft Internet Explorer that allows Web content to be "webcast" to users.

Overview

Channels deliver content to users' Web browsers. The content is displayed as ordinary Web pages and can be viewed off line. Channels are delivered to users by way of Microsoft Corporation's Channel Definition Format (CDF) technology. Channels can contain Hypertext Markup Language (HTML); Microsoft ActiveX controls; Microsoft Visual Basic, Scripting Edition (VBScript); Java applets; and other dynamic Web elements. The channels that a user has subscribed to are listed as part of his or her channel bar.

See Also Channel Definition Format (CDF)

channel bank

A telecommunications device that consolidates multiple Digital Signal Zero (DS0) channels into a larger single digital transmission.

Overview

Channel banks usually combine 24 different voice and data 64 kilobits per second (Kbps) DS0 channels into a single 1.544 megabits per second (Mbps) DS1 channel, though some channel banks are capable of combining up to 96 DS0 channels into a 6.312 Mbps DS2 channel. The channel bank combines the individual DS0 signals using a technique called multiplexing, which allows multiple signals to be combined for transmission over a single line. The resulting multiplexed digital signal can then be sent over a T1 line to the telco.

A channel bank interfaces with the wires of the local loop connection that carry the phone signals from the customer premises to the telco's central office (CO). In a typical business scenario, the channel bank would be connected to the front end of an analog Private Branch Exchange (PBX) to support multiple telephones within the company. The channel bank also includes circuits for converting the analog voice signals into digital data signals, usually using pulse code modulation (PCM). The resulting modulated digital signal conforms to the standard 64-Kbps DS0 format. The digital signals can then be routed through the digital switching backbone of the Public Switched Telephone Network (PSTN) as necessary.

Channel banks are typically located at the telco's CO and support the digital switching functions of the PSTN. However, channel bank equipment can also be installed at customer premises for larger enterprises.

Notes

Channel banks are becoming obsolete as older analog PBXs are being replaced by digital PBXs. When a digital PBX is used, the PBX can be connected directly to the T1 line using a Channel Service Unit (CSU), making a channel bank unnecessary.

See Also Channel Service Unit (CSU) ,DS-0 ,multiplexer (MUX) ,Private Branch Exchange (PBX) ,pulse code modulation (PCM) ,T1

channel bar

A component of Microsoft Internet Explorer version 4 and later that displays the available user-subscribed Active Channels.

Overview

Active Channels provide a way of webcasting information to subscribers using Microsoft Corporation's Channel Definition Format (CDF) technology. When Internet Explorer is first installed on a user's machine, a selection of preloaded channels is stored in the channel bar according to the country or region preference the user specified during installation. These channels are stored by default in C:\Windows\Favorites\Channels on a computer running Microsoft Windows 95 or Windows 98 and in C:\Winnt\Profiles\<user>\Favorites\Channels on a computer running Windows NT, Windows 2000, Windows XP, or Windows .NET Server. When a user subscribes to a channel, a small red gleam appears next to the icon representing the channel. This gleam indicates that new content has been downloaded and is available for browsing.

Notes

Administrators who plan to deliver and install Internet Explorer on users' machines can use the Internet Explorer Administration Kit (IEAK) to customize the users' set of startup channels. Administrators can thus use the channel bar to deliver important information to users through the company's intranet site.

See Also Channel Definition Format (CDF)

Channel Definition Format (CDF)

An open standard created by Microsoft Corporation for Microsoft Internet Explorer version 4 (and proposed as a standard to the World Wide Web Consortium [W3C]) that defines a "smart pull" technology for webcasting information to users' desktops.

Overview

Based on the Extensible Markup Language (XML), Channel Definition Format (CDF) lets administrators create Active Channels for delivery of content through the user's Web browser and Active Desktop elements and channel screen savers for delivery directly to the user's desktop. Channel content can be personalized, and delivery can be scheduled according to users' needs and preferences. Using CDF also reduces server load and allows delivery of just the needed content, instead of requiring users to download large quantities of unnecessary content.

Consider the delivery of Web content to the user's browser using Active Channels. A Web site can be made into an Active Channel through the addition of a CDF file, a simple text file formatted using XML. It forms a kind of table of contents of the logical subset of the Web site that comprises the Active Channel. A link is then created to the CDF file on the Web site. The user clicks the link to subscribe to the Active Channel and download the CDF file. The Active Channel then appears on the channel bar on the user's desktop. The content for the channel is downloaded to a cache on the user's system. Channel updates are accomplished by scheduled Web crawls, using either the publisher's predefined schedule or a user's customized one. Users can also receive updates to channels by e-mail.

Some of the advantages of using CDF for the distribution of Web information to users include

Notes

CDF is not true webcasting in the sense of Internet Protocol (IP) multicasting because it is a "pull" technology. True webcasting is supported by Microsoft Windows Media Player for delivery of content using IP multi- casting.

channel (Microsoft Windows Media Player)

In Microsoft Windows Media Player, a mechanism that supplies clients with information needed to receive and render Advanced Streaming Format (ASF) streams.

Overview

A Windows Media Player channel specifies the multicast address and port number the clients should listen to in order to receive the stream. The channel also specifies the data types and formats in the stream, enabling the client to correctly render the stream. Windows Media Player saves channel information as files with the extension .nsc. A Windows Media Player channel is analogous to a television channel or a radio frequency: if a Windows Media Player client is tuned to a channel at the right time, the client receives streaming information sent by the Windows Media Player server.

Windows Media Player channels also support additional features, such as

Channel Service Unit (CSU)

A device that is used to connect a synchronous digital telecommunications line to a computer network.

Overview

Channel Service Units (CSUs) are used to link local area networks (LANs) into a wide area network (WAN) using telecommunications carrier services such as Digital Data Services (DDS), T-carrier services such as a T1 line, and frame relay links.

The function of a CSU is to terminate the carrier's digital line at the customer premises. It also provides signal amplification and allows the carrier to perform remote loopback testing to monitor and troubleshoot the integrity of the line. Some CSUs also support Simple Network Management Protocol (SNMP) features that allow the unit to be monitored by the service provider.

Channel Service Unit (CSU). Using a CSU in a WAN link.

CSUs are always used together with Data Service Units (DSUs), which convert signals from data terminal equipment (DTE) such as a router, switch, multiplexer (MUX), or dedicated server on the LAN to a signaling format suitable for transmission over the line.

Implementation

The service provider interface of the CSU terminates at the telco's digital line where it enters the customer premises. The other interface of the CSU then connects to a DSU, and then the DSU connects with data terminal equipment (DTE) on the LAN (a router, switch, or other LAN device). The DTE is typically an RS-232 or a V.35 serial transmission interface.

Typically, the telecommunications service provider will lease the CSU to the customer, having preconfigured it for the type of digital line to be supported. CSUs usually come in a dual Channel Service Unit/Data Service Unit (CSU/DSU) package that drops into the edge of the network to provide WAN link connectivity. Dedicated stand-alone CSUs are typically used only for interfacing with installed customer premises telecommunications equipment that contains integrated DSUs. This installed equipment could be a channel bank, Private Branch Exchange (PBX), T1 multiplexer, or some other device. Some access routers have built-in CSU/DSUs as well.

See Also Channel Service Unit/Data Service Unit (CSU/DSU) ,Data Service Unit (DSU)

Channel Service Unit/Data Service Unit (CSU/DSU)

A device that combines the functions of both a Channel Service Unit (CSU) and a Data Service Unit (DSU).

Overview

Channel Service Unit/Data Service Units (CSU/DSUs) are placed between the telephone company network and the customer network at the demarcation point and are the local interfaces between the data terminal equipment (DTE) at the customer premises and the telco's digital communications line (such as a T1 line).

CSU/DSUs package digital data into a format suitable for the particular digital transmission line they are servicing and buffer and rate-adapt digital signals going to and from the telephone company network. CSU/DSUs ensure that data frames are properly formed and timed for the telephone company network and provide a protective barrier to electrical disturbances that can harm customer premises equipment (CPE).

Channel Service Unit/Data Service Unit (CSU/DSU). Using a CSU/DSU to connect two local area networks (LANs) over a wide area network (WAN) link

Implementation

CSU/DSUs essentially function as the digital counterpart to analog modems. They are typically external units that look similar to an external modem, but they can also come in sizes that can be mounted in a rack. Unlike analog modems, CSU/DSUs do not perform signal conversion because the signal at both ends is already digital.

Digital lines usually terminate at customer premises with four-wire connections having various connector types, including RJ-45, four-screw terminal blocks, and M-block connectors (used for V.35 interfaces). The four-wire connection is joined to the appropriate connector on the CSU/DSU. The CSU/DSU typically adjusts itself to the line speed of the digital data service (DDS) line using an autosensing feature. The customer's CSU/DSU then connects directly to the customer's router and from there connects to the customer's network.

At the other end of the DDS line at the central office (CO), the telco has a similar CSU that interfaces with a multiplexer to feed into the carrier's backbone network.

Notes

When purchasing CSU/DSUs, consider first the traffic requirements of your wide area network (WAN) link and make sure they support the full range of data rates for the DDS lines you plan to use (56 K, 64 K, or T1 speed).

See Also Channel Service Unit (CSU) ,Data Service Unit (DSU)

CHAP

Stands for Challenge Handshake Authentication Protocol, a standard form of challenge/response authentication protocol.

See Also Challenge Handshake Authentication Protocol (CHAP)

child domain

A domain in a Microsoft Windows 2000 or Windows .NET Server domain tree whose Domain Name System (DNS) name is a subdomain of the parent domain.

Overview

As an example, if the name of the parent or company domain is microsoft.com, some typical names of child domains might include dev.microsoft.com, marketing.microsoft.com, and support.microsoft.com.

You can create new child domains using the Active Directory Installation Wizard. You must create a child domain in an existing domain tree, because creating a new tree automatically creates a new parent domain. A two-way transitive trust exists between a parent domain and its child domains.

See Also Active Directory ,domain tree

CICS

Stands for Customer Information Control System, the multipurpose transaction monitor for IBM mainframe computing environments.

See Also Customer Information Control System (CICS)

CIDR

Stands for classless interdomain routing, an alternative way of classifying Internet Protocol (IP) addresses from the traditional class A-E system. Also called supernetting.

See Also classless interdomain routing (CIDR)

CIFS

Stands for Common Internet File System, a public version of the Server Message Block (SMB) file- sharing protocol that has been tuned for use over the Internet.

See Also Common Internet File System (CIFS)

CIM

Stands for Common Information Model, a schema for defining manageable network objects.

See Also Common Information Model (CIM)

CIM Object Manager (CIMOM)

Part of the Microsoft Windows Management Information (WMI) architecture.

Overview

CIM Object Manager (CIMOM) functions as a broker for object requests within the WMI architecture. CIMOM supplies the required interfaces between management applications (WMI consumers) and a managed physical or logical network object (WMI providers).

CIMOM abstracts management information from a variety of different providers, including the Win32 programming interfaces for Windows applications and the Simple Network Management Protocol (SNMP) for managed network devices. CIMOM then employs the WMI application programming interface (API) to present the gathered information in a consistent fashion to the network management application.

A network management application can register with CIMOM in order to receive notifications when specific network events occur, such as a full disk or a saturated network path. If such a condition arises, the WMI provider for the managed device or application sends a notification to CIMOM, which notifies the registered management application of the condition.

See Also Common Information Model (CIM) ,Windows Management Instrumentation (WMI)

CIMOM

Stands for CIM Object Manager, part of the Microsoft Windows Management Information (WMI) architecture.

See Also CIM Object Manager (CIMOM)

CIP

Stands for Classical IP, a method for running Internet Protocol (IP) packets over Asynchronous Transfer Mode (ATM) networks.

See Also Classical IP (CIP)

CIR

Stands for Committed Information Rate, a way of guaranteeing bandwidth in frame relay services.

See Also Committed Information Rate (CIR)

circuit

A path between two points over which an electrical signal can pass.

Overview

In telecommunications, a circuit is a path over which voice, data, or other analog or digital signals can pass. A physical circuit is a collection of wires or cables that are connected with switches or other devices; it can be thought of as a straight line between the two endpoints.

Circuit. Two basic types of circuits.

For an electrical signal to actually flow between two points in a circuit, the circuit must be closed-that is, there must be a return path for the current. Two basic types of circuits are used in serial transmission for telecommunications technologies:

Balanced circuits typically support higher data transmission rates because the are less susceptible to noise caused by electromagnetic interference (EMI) than unbalanced circuits.

Notes

A typical serial interface such as RS-232 includes specifications for a number of different types of circuits, including data circuits, control circuits, timing circuits, secondary circuits, and ground connections.

See Also circuit-switched services ,virtual circuit

circuit layer proxy

Any service or server that provides proxy services using a specially installed component on the client computer to form a circuit between the proxy server and the client computer.

Overview

Microsoft Proxy Server is a product that combines firewall and proxy server functions and has two services for providing circuit-level proxy functions:

Notes

Circuit layer proxies support a wider variety of protocols than application layer proxies.

See Also application layer proxy

circuit-level gateway

A type of firewall that provides session-level control over network traffic.

Overview

Similar in operation to packet filtering routers, circuit-level gateways operate at a higher layer of the Open Systems Interconnection (OSI) reference model protocol stack. Circuit-level gateways are host-based and reside on individual clients and servers inside the network, rather than on a dedicated machine as they do with other types of firewalls. Circuit-level gateways examine incoming Internet Protocol (IP) packets at the session level-Transmission Control Protocol (TCP) or User Datagram Protocol (UDP)-and act as relays by handing off incoming packets to other hosts. Circuit-level gateways are rarely used as a stand-alone firewall solution; instead, they are typically used in combination with application layer proxy services and packet filtering features in dedicated firewall applications.

Microsoft Proxy Server combines the features of packet filtering, circuit-level gateways, and application layer proxy to provide a full firewall solution for protecting your corporate network. Proxy Server supports both the SOCKS protocol, which provides nontransparent circuit-level gateway security, and the Winsock Proxy, which provides transparent circuit-level gateway security.

See Also firewall ,proxy server

circuit-switched services

A term describing any telecommunications service that provides switched connections between a telco and their customers.

Overview

Circuit switching is the oldest form of digital communications used by telecommunications carriers. Circuit- switched telecommunications services can be provided to businesses by both local telcos and long-distance carriers. The Public Switched Telephone Network (PSTN) is the classic example of a circuit-switched service (even its earlier analog form as the Plain Old Telephone System [POTS], it was also circuit-switched in operation). Another common example, often used for wide area network (WAN) connectivity between companies and remote branch offices, is Integrated Services Digital Network (ISDN).

Circuit-switched services. How typical circuit-switched services work.

Circuit-switched services are generally more suitable than packet-switched services for real-time transport of delay-sensitive traffic such as voice and video. This is because, after the circuit has been set up for a given connection, traffic is routed with minimal delay to its destination. Circuit-switched services offer guaranteed delivery and differentiated services that are only beginning to be offered by packet-switched services such as Ethernet that carry best-effort Internet Protocol (IP) traffic.

Uses

In the enterprise, circuit-switched services are often used as backup lines for more expensive leased lines. For example, if your more expensive T1 line fails, you can switch to a dial-up ISDN line (if it comes from a different provider). When using circuit-switched services, it is a good idea to monitor their usage because when a certain usage level is reached, leased lines may become economically preferable. Leased lines such as T1 lines use dedicated switches that are set up in a permanent configuration for as long as the customer leases the services.

Implementation

With circuit-switched services, a new switched circuit must be established each time one local area network (LAN) attempts to connect to a remote LAN. Circuit-switched services are temporary circuits only, and when the connection is terminated the circuits are torn down. Different switches can be used for each connection established, depending on availability and traffic, so the quality of services can vary between connections.

Typically, your corporate LAN is connected to these services through bridges, routers, modems, terminal adapters, or other equipment, depending on the type of service being offered. At the other end of the connection is the telco central office (CO), which sets up switches on demand to connect you to your remote branch office LAN. When you disconnect the WAN link, the switches are freed up for other purposes.

Advantages and Disadvantages

One advantage of circuit-switched services is that they are generally less expensive than leased lines. This is because switches are not dedicated to your network as leased lines are, and can therefore be used for other purposes when you are not using them. The cost for circuit-switched services is usually based on usage.

Another advantage of circuit-switched services is that you are not restricted to a single destination as you are with leased lines; you can dial up any destination that supports services similar to yours.

A disadvantage with circuit-switched services is that they are usually dial-up in nature, and a dial-up connection takes time to be established. This connection time varies with the technology used. For example, analog modems might take 10 to 20 seconds to establish a connection, and an ISDN terminal adapter might take only 1 to 2 seconds. This latency interval tends to make circuit-switched lines unsuitable for dedicated services, such as those used for connecting company Web servers to the Internet.

Another disadvantage of circuit-switched services is that the quality can differ substantially between connections, because each circuit is a temporary connection that can exist along different paths, switches, and communication devices.

See Also Integrated Services Digital Network (ISDN) ,leased line ,Multiprotocol Label Switching (MPLS) ,packet-switching services ,T1

circular logging

A feature of Microsoft Exchange Server whereby transaction logs can be overwritten when full. Circular logging lowers disk space usage but reduces the chances of successfully recovering from a system crash.

Overview

Exchange Server databases, such as the directory database and information store, maintain special log files called transaction log files. These log files improve the performance and fault tolerance of the databases, and help track and maintain changes made to them. Transactions are immediately written both to the log files and to memory, and only afterward to the database files. Transaction logs are normally kept on a different drive from the database files to ensure fault tolerance in case of a disaster that causes data loss, such as a crashed disk or a power failure.

When circular logging is enabled, only a few transaction log files are maintained, and these are overwritten when they become full. This prevents log files from continually building up, which saves disk space. However, circular logging has the disadvantage of allowing you to perform only full backups, rather than incremental or differential ones, because you can restore information only up to the last full backup.

Notes

Do not use circular logging if data recoverability is of high importance to your mail system, which is almost always the case with e-mail. Circular logging is enabled by default. You should always disable it and ensure that you have enough free disk space to hold the transaction files. The only reasons you might want to enable circular logging would be if you run low on disk space or if your server is being used for noncritical data only, such as a public news server.

class

More precisely called "object class," a logical grouping of objects within Active Directory directory service in Microsoft Windows 2000 and Windows .NET Server.

Overview

Objects are organized within Active Directory by their classes. Examples of object classes can include users, groups, computers, domains, and organizational units (OUs). Each class of objects has its own defining properties or attributes, as laid out in the Active Directory schema. Grouping objects logically into classes makes it easier to find and access these resources on the network.

Active Directory comes with predefined object classes. You can create additional classes or modify existing ones using the Active Directory schema.

See Also Active Directory ,object (Active Directory)

Class A

A type of Internet Protocol (IP) network where the first octet of IP addresses ranges between 0 and 126 inclusive.

Overview

Class A networks were originally intended for very large internetworks. Using the default class A subnet mask of 255.0.0.0, each class A network can support a maximum of 16,777,214 individual hosts with unique IP addresses-large enough for the largest of enterprise networks. However, there are no longer any Class A networks available since all 125 of them were assigned in the 1980s to large corporate customers, organizations, and the military. None of these organizations actually has networks large enough to require the full 16 million host addresses provided by their Class A addresses, so classless interdomain routing (CIDR) was developed by the Internet Engineering Task Force (IETF) to allow unused Class A addresses to be reassigned to other users.

Notes

For a huge private network not directly connected to the Internet or hidden behind a firewall using Network Address Translation (NAT), the Internet Assigned Numbers Authority (IANA) recommends using Class A addresses whose first octet is 10. This provides millions of possible host addresses ranging from 10.0.0.1 to 10.255.255.254.

The Class A address 127.0.0.1 is reserved for loopback and represents the local host being used.

See Also Class B ,Class C ,Class D ,Class E ,classful domain IP address

Class B

A type of Internet Protocol (IP) network where the first octet of IP addresses ranges between 128 and 191 inclusive.

Overview

Class B networks were originally intended for large internetworks. Using the default Class B subnet mask of 255.255.0.0, each Class B network can support up to 65,534 individual hosts with unique IP addresses-large enough for the largest of enterprise networks. There are 65,536 possible Class B networks that can be assigned, and in the early days of internetworking a number of these network IDs were assigned to large corporations and to the military by the Internet Assigned Numbers Authority (IANA). Today it is virtually impossible to obtain a class B network ID.

Notes

For a large private network not directly connected to the Internet or hidden behind a firewall using Network Address Translation (NAT), IANA recommends using Class B addresses whose first two octets range from 172.16 to 172.31. This provides many thousands of host addresses ranging from 172.16.0.1 through 172.31.255.254 and up to 16 different subnets if required.

See Also Class A ,Class C ,Class D ,Class E IP address

class-based queuing (CBQ)

An emerging technology for wide area network (WAN) traffic management.

Overview

Traditionally, WAN traffic for different classes of service (CoS) have been managed using router-based schemes that provide best-effort control of bandwidth allocation. For example, a router might be configured to allow no more than 20 percent of available bandwidth for streaming video. Such a bandwidth allocation is relative (percentage) rather than absolute (bps) in nature, which does not give much granularity for control of traffic, particularly mission-critical network traffic.

Class-based queuing (CBQ) is an emerging technology for WAN access routers that allows network managers to classify traffic types into a hierarchy of classes and then assign absolute bandwidth allocations to each type. For example, CBQ could first be used to divide traffic types according to different kinds of business applications and then to create a second level classifying traffic according to the department using the application. The customer relationship management (CRM) software used by the marketing department could then be assured a given minimum bandwidth.

Implementation

CBQ operates at Level 2 (the network layer) for IP traffic and works with any IP protocol including Transmission Control Protocol (TCP), User Datagram Protocol (UDP), or Internet Control Message Protocol (ICMP). To implement CBQ in a corporate WAN setting, a CBQ-capable access router would be inserted at the WAN edge of each corporate local area network (LAN) and configured with suitable classes to control allocation of bandwidth for WAN traffic. CBQ classes are implemented on routers by using policies.

Class-based queuing (CBQ). Implementing CBQ on a WAN.

See Also wide area network (WAN)

Class C

A type of Internet Protocol (IP) network where the first octet of IP addresses ranges between 192 and 223 inclusive.

Overview

Class C networks were originally intended for small internetworks. Using the default Class C subnet mask of 255.255.255.0, each Class C network can support up to 254 individual hosts with unique IP addresses. There are 16,777,216 possible Class C networks that can be assigned, and it is relatively easy to obtain a Class C network ID from your Internet Service Provider (ISP) should your company require it.

Notes

For a small private network not directly connected to the Internet or hidden behind a firewall using Network Address Translation (NAT), the Internet Assigned Numbers Authority (IANA) recommends using Class C addresses whose first three octets range from 192.168.0 through 192.168.255. This provides thousands of host addresses ranging from 192.168.0.1 through 192.168.255.254 and up to 256 different subnets if required.

See Also Class A ,Class C ,Class D ,Class E IP address

Class D

A type of Internet Protocol (IP) network where the first octet of IP addresses ranges between 224 and 239 inclusive.

Overview

Class D addresses are used exclusively for multicasting purposes. Most Class D addresses whose first octet is 224 are reserved for special purposes, as shown in the table. For multicasting within a private network not directly connected to the Internet or hidden behind a firewall using Network Address Translation (NAT), the Internet Assigned Numbers Authority (IANA) recommends using Class D addresses whose first octet is 239. For multicasting over the Internet you must first obtain a multicast address from IANA.

Examples of Some Reserved Class D Addresses with First Octet 224.

Address

Reserved for

224.0.0.1

Multicasting to all hosts on the local subnet

224.0.0.2

Multicasting to all routers on the local subnet

224.0.0.4

Multicasting to all Distance Vector Multicast Routing Protocol (DVMRP) routers

224.0.0.5

Multicasting to all Multicast Open Shortest Path First (MOSPF) routers

224.0.0.9

Multicasting to all Routing Internet Protocol version 2 (RIPv2) routers

224.0.0.10

Multicasting to all Interior Gateway Routing Protocol (IGRP) routers

224.0.18.255

Dow Jones multicasting service

See Also Class A ,Class B ,Class C ,Class E IP address

Class E

A type of Internet Protocol (IP) network where the first octet of IP addresses ranges between 240 and 255 inclusive.

Overview

Class E addresses are reserved for research and experimental purposes, and are not used in ordinary computer networking. Class E addresses have a first octet that ranges from 240 to 255. The only Class E address commonly used is 255.255.255.255, which represents a local area network (LAN) broadcast.

See Also Class A ,Class B ,Class C ,Class D IP address

classful domain

An Internet Protocol (IP) network that uses a default subnet mask.

Overview

A classful domain is an IP network that contains only the single default subnet. All hosts on the network are therefore in the same broadcast domain. For example, a network that is using a Class A address such as 10.0.0.0 and the default subnet mask 255.0.0.0 is a classful domain. The same would be true of a network using a Class B address such as 172.11.0.0 with subnet mask 255.255.0.0 and a network using a Class C address such as 192.16.33.0 with subnet mask 255.255.255.0-all three of these are examples of classful domains and are networks with only one subnet and therefore one broadcast domain.

Generally speaking, classful domains are not the way to go as they are very busy places with respect to traffic and may be susceptible to broadcast storms. Large networks are thus subnetted into a group of subnets forming what is called a classless domain.

See Also classless domain ,IP address ,subnetting

classful routing protocol

A routing protocol for classful networks.

Overview

Classful routing protocols require that all Internet Protocol (IP) addresses on a network have the same subnet mask. For example, if a Class B network ID of 172.24.0.0 is subnetted into several subnets such as 172.24.1.0, 172.24.2.0, and 172.24.3.0, then classful routing requires that all these subnets have the same subnet mask. The reason for this limitation is that when routers using classful routing protocols exchange routing table updates with one another, the subnet mask is not included in the updates.

Examples of common classful routing protocols include Routing Information Protocol (RIP) versions 1 and 2, and Interior Gateway Routing Protocol (IGRP).

See Also Interior Gateway Routing Protocol (IGRP) ,routing ,Routing Information Protocol (RIP) ,routing protocol

Classical IP (CIP)

A method for running Internet Protocol (IP) over Asynchronous Transfer Mode (ATM).

Overview

Classical IP (CIP) is an alternative to LAN Emulation (LANE) as a way of transporting IP packets over Asynchronous Transfer Mode (ATM) networks. CIP is based on RFC 1577 and supports only IP and no other network protocols (LANE can also be used to transport multiprotocol traffic such as IP and Internetwork Packet Exchange [IPX] over ATM). CIP has a number of benefits that make it an attractive solution in many situations:

Implementation

CIP groups IP hosts together into groupings called logical IP subnets (LISs). Each LIS has an Address Resolution Protocol (ARP) server to support IP broadcasts. Because broadcasts are essential to IP for the operation of the ARP, CIP implements a device called an ARP server to eliminate the need for these broadcasts. This is necessary because ATM in itself does not support broadcasts. When an IP host appears on a CIP network, it first registers itself with the ARP server so that IP communications can take place.

When an IP host needs to communicate with a target host on the network, it passes the IP address of the target host to the ARP server in the LIS, which returns the ATM address of the target host. To make this possible, the ARP server must be preconfigured with mappings of the IP and ATM addresses of each IP host in the LIS. When the host knows the target host's ATM address, a switched virtual circuit (SVC) can be established between the two hosts and IP packets can be transmitted to the target host.

An alternative implementation of CIP is called CIP over PVC (permanent virtual circuit). This is used primarily for wide area network (WAN) connections that are always on.

See Also Asynchronous Transfer Mode (ATM) ,LAN Emulation (LANE)

Classic desktop

A way of displaying the desktop and its contents that was first used in Microsoft Windows 95.

Overview

The Classic desktop presents users with a graphical user interface (GUI) that allows icons, shortcuts, files, and folders to be placed on it. These desktop items provide a simple way for users to launch and access frequently used programs and network resources. The Start menu provides another tool for launching programs and accessing resources. The taskbar displays the programs currently running and the Windows-to- network resources that are open.

The choice of GUI for users' client computers can make a big difference in employee productivity. The following are two factors involved in determining whether network administrators should maintain the Classic desktop or upgrade to the newer Active Desktop included with Microsoft Internet Explorer beginning with version 4:

classless domain

An Internet Protocol (IP) network that uses a variable-bit subnet mask.

Overview

A classful domain is an IP network that uses a default subnet mask such as 255.0.0.0 for Class A networks, 255.255.0.0 for Class B, or 255.255.255.0 for Class C. Classful domains thus have only one subnet and one broadcast domain. By contrast, a classless domain is an IP network that uses a variable-bit subnet mask (VBSM), also called a classless subnet mask, to divide the network into two or more subnets, each of which represents a different broadcast domain.

Classless domains are generally built using routers. Each subnet within a classless domain constitutes a unique broadcast domain and collision domain, which generally improves performance over using a single broadcast and collision domain. Switches operate at the data-link layer and can partition a network into different collision domains, but they do not create different broadcast domains.

See Also classful domain ,IP address ,subnetting

classless interdomain routing (CIDR)

Also called supernetting, an alternative way of classifying Internet Protocol (IP) addresses from the traditional Class A-E system.

Overview

Classless interdomain routing (CIDR) is a more efficient routing mechanism than the original method of segregating network IP addresses into classes named Class A, B, and C. The trouble with the old system is that it leaves too many unused IP addresses. For example, while Class A networks support large numbers of network nodes, there are not enough Class A networks to go around and none of the owners of these networks make anywhere near full use of the large number of IP addresses available to them. As a result, large numbers of Class A (and Class B) IP addresses go unused, and CIDR was developed as a way of reclaiming those IP addresses for allocation elsewhere. Similarly, while many Class C network IDs are available, many companies require more than the 254 IP addresses available on a Class C network, but not nearly as many as the 65,534 IP addresses available on any Class B network.

History

In the late 1980s, prescient architects of the Internet foresaw that the standard Class A-E method for assigning IP addresses would eventually fail and that the routing tables used by the core routers of the Internet's backbones would eventually grow unmanageably large. The class system provides for a huge number of IP addresses, but for only about 2 million different IP networks. As the number of networks attached to the Internet grew exponentially, a time was anticipated when there would be no more network numbers left to assign for new Class B and C networks (all Class A networks were assigned early on).

In the early 1990s the Internet Engineering Task Force (IETF) produced a group of Requests for Comments (RFCs), namely RFCs 1517 to 1520, that brought a way out of the dilemma. These RFCs formed the basis of CIDR and provided a way of not only reducing the growing load on the Internet's core routing tables (another result of the Internet's rapid growth) but also of reusing unused IP addresses to make about 8 million additional IP networks of Class C size available for assignment to other companies and organizations.

Uses

CIDR is used primarily by routers and gateways on the backbone of the Internet for routing packets across the Internet. CIDR is not used much in private networks because most networks are hidden behind firewalls and can use any arbitrary block of IP addresses, such as the 10.x.y.z block allocated by Internet Network Information Center (InterNIC) for general, private use. Instead, CIDR comes into its own on the Internet backbone to facilitate routing and ensure the continued functioning of the Internet. However, CIDR is viewed only as a workaround to the issues of insufficient numbers of IP networks available for allocation and maintaining the routing tables of backbone routers at workable sizes. Most Internet architects see IPv6 as the real solution to these issues and expect the need to change over to this system of addressing in the next few years.

Implementation

CIDR replaces the old class method of allocating 8, 16, or 24 bits to the network ID, and instead allows any number of contiguous bits in the IP address to be allocated as the network ID. For example, if a company needs a few thousand IP addresses for its network, it can allocate 11 or 12 bits of the address for the network ID instead of 8 bits for a Class C (which would not work because you would need to use several Class C networks) or 16 bits for Class B (which is wasteful).

CIDR assigns a numerical prefix to each IP address. For example, a typical destination IP address using CIDR might be 177.67.5.44/13 (the last part being pronounced "slash thirteen"). The suffix /13 indicates that the first 13 bits of the IP address identify the network, while the remaining 32-13 = 19 bits identify the host. In subnetting notation, the CIDR address 177.67.5.44/13 would be equivalent to the combination of IP address 177.67.5.44 and subnet mask 255.255.128.0 (see the following table). As another example, in CIDR notation an old style class B network 132.16.0.0 with default subnet mask 255.255.0.0 would be represented simply as 132.16/16.

The prefix helps to identify the Internet destination gateway or group of gateways to which the packet will be forwarded. Prefixes vary in size, with longer prefixes indicating more specific destinations. Routers use the longest possible prefix in their routing tables when determining how to forward each packet. CIDR enables packets to be sent to groups of networks instead of to individual networks, which considerably simplifies the complex routing tables of the Internet's backbone routers. The table shows the different CIDR values and their subnet mask equivalents.

CIDR Values and Their Subnet Mask Equivalents

Class

CIDR Value

Subnet Mask

Class A

/8

255.0.0.0

/9

255.128.0.0

/10

255.192.0.0

/11

255.224.0.0

/12

255.240.0.0

/13

255.248.0.0

/14

255.252.0.0

/15

255.254.0.0

/16

255.255.0.0

Class B

/17

255.255.128.0

/18

255.255.192.0

/19

255.255.224.0

/20

255.255.240.0

/21

255.255.248.0

/22

255.255.252.0

/23

255.255.254.0

/24

255.255.255.0

Class C

/25

255.255.255.128

/26

255.255.255.192

/27

255.255.255.224

/28

255.255.255.240

/29

255.255.255.248

/30

255.255.255.252

/31

255.255.255.254

/32

255.255.255.255

Notes

There might seem to be an alternate solution for avoiding the waste of IP addresses from Class A and Class B networks. Consider, for example, a company with a network of 5,000 nodes. Assigning a single Class B network ID such as 166.33.0.0 to the network would provide 65,534 possible IP addresses for hosts, which is far too many-60,534 addresses would remain unused. A solution to this might seem to be assigning the company a contiguous set of 20 Class C network IDs. Because each Class C address provides 254 possible host addresses, 20 contiguous Class C network Ids, such as 198.15.1.0 through 198.15.20.0, would provide 20 x 254 = 5080 possible IP addresses, which is just right, plus a few to spare.

Using this technique does eliminate the wasting of IP addresses, but it creates a new problem: to handle routing between your corporate network and the Internet, you need to add 20 new entries to the routing tables on Internet routers, one entry for each network ID you are using. Following this method quickly overwhelms the routers that form the Internet's backbone because as their routing tables grow their performance slows down. CIDR was devised to address this very issue by decreasing the number of entries required in the Internet's routing tables. CIDR does this by supernetting the 20 Class C networks above into a single supernet, which needs only one entry in the routing tables.

See Also Internet ,IP address ,IPv6 ,routing

classless routing protocol

A routing protocol for classless networks.

Overview

Classless routing protocols allow different portions of an Internet Protocol (IP) network to use different subnet masks for the same network ID. Then, when routers using classless routing protocols exchange routing table updates with one another, the subnet mask is included in each update. Thus, given a single IP network ID, variable length subnet masking (VLSM) may be used to create different subnets having different subnet masks. Classless routing protocols also help conserve network resources by using route summarization.

Examples of common classless routing protocols include Border Gateway Protocol (BGP), Enhanced Interior Gateway Routing Protocol (EIGRP), and Open Shortest Path First (OSPF).

See Also Border Gateway Protocol (BGP) ,Enhanced Interior Gateway Routing Protocol (EIGRP) ,Open Shortest Path First (OSPF) ,routing ,routing protocol

CLB

Stands for Component Load Balancing, a Microsoft clustering technology supported by Microsoft Windows 2000 Server and Windows .NET Server and provided by Microsoft Application Center 2000.

See Also Component Load Balancing (CLB)

cleartext

The process of sending data over a network in an unencrypted form.

Overview

By using a packet sniffer or software such as Network Monitor, anyone who can capture cleartext packets can read the information within them. Cleartext authentication methods are sometimes the best choice in a heterogeneous network environment where users running different operating system platforms need to access resources on network servers. For example, UNIX clients that need to access a Microsoft Internet Information Services (IIS) machine using a Web browser will need to be authenticated using a cleartext method called Basic Authentication.

Notes

Basic Authentication is usually described as cleartext authentication, but in actuality Basic Authentication weakly encrypts data using the well-known Uuencoding algorithm. This algorithm is in the public domain and can easily be decrypted by knowledgeable users.

The standard AppleTalk protocol uses clear-text authentication for allowing Apple Macintosh clients to access shared folders on Macintosh file servers using AppleShare.

See Also Basic authentication

cleartext authentication

Also called Basic authentication, an authentication scheme that passes a user's credentials over a network in encrypted form.

See Also Basic authentication

ClearType

A new display technology from Microsoft Corporation designed for liquid crystal display (LCD) displays.

Overview

Microsoft ClearType is intended to provide more readable displays on LCD screens for laptops, tablet PCs, and Pocket PCs. ClearType does this by a process known as sub-pixel rendering, which triples the perceived number of pixels for vertical screen resolution (horizontal resolution remains unchanged). The results are easier-to-read text that appears more like a page out of a book than text displayed on a screen. ClearType was designed with Microsoft Reader in mind, a technology developed by Microsoft for eBooks.

ClearType technology was developed by Microsoft Research, but a similar subpixel rendering concept was developed in the 1970s by Steve Gibson for the Apple II platform. ClearType support will be included in all future releases of Microsoft Windows and Microsoft Office.

For More Information

You can find out more about ClearType at research.microsoft.com

CLEC

Stands for Competitive Local Exchange Carrier, a telco that competes with existing incumbent telcos under the terms of the Telecommunications Act of 1996.

See Also Competitive Local Exchange Carrier (CLEC)

client

A workstation or computer, usually belonging to a single user, as opposed to a server, which is shared by many users.

Overview

Planning the hardware, software, configuration, deployment, and maintenance of clients is as important to the network administrator as the other server-related activities.

Choice of a client operating system depends on various considerations. For example, in determining whether to install Microsoft Windows Millennium Edition (Me), Windows 2000 Professional, or Windows XP Professional on client computers, users should consider the following:

Notes

In configuring clients to operate on a network, appropriate software must be installed on each client to allow it to access servers on the network. For example, to access Windows 2000 servers, client machines require Microsoft client software such as Client for Microsoft Networks. To access Novell NetWare servers, client machines require NetWare-compatible clients, such as Client for NetWare Networks.

See Also client/server ,server

client access license (CAL)

A license that grants a client machine access to a Microsoft BackOffice product running on a network of computers.

Overview

Every client computer on a network, regardless of whether it is running a Microsoft or non-Microsoft operating system, requires a client access license (CAL) if it will be accessing any of the following Microsoft Windows NT, Windows 2000, Windows XP, or Windows .NET Server services:

Client access licenses can operate in one of two modes:

See Also license

client certificate

A digital certificate obtained for a client application (such as a Web browser) that can be used by the client to digitally sign data it transmits.

Overview

Client certificates can be used to enable client machine authentication for the purpose of secure communication over the Internet using the Secure Sockets Layer (SSL) protocol.

Client certificate. Importing a client certificate in the Internet Explorer Properties dialog box.

A client obtains a certificate from a certificate authority (CA) by submitting a certificate request file. The CA responds by issuing a client certificate, which contains the client's identification information in encrypted form, along with the client's public key. The client certificate must then be installed on the client's Web browser. Microsoft Internet Explorer can import client certificates into the browser's certificate store using the Personal button on the Content tab of the Internet Options dialog box. Administrators can also use the Internet Explorer Administration Kit (IEAK) for preconfiguring client certificates prior to installation on user computers.

In SSL communication, a Web server can validate the identity of a client using the certificate installed on the client. With Microsoft Internet Information Server (IIS) version 4, client certificates can be mapped to Microsoft Windows NT user accounts by way of a process called certificate mapping. (Windows 2000, Windows XP, and Windows .NET Server support a similar feature in their Internet Information Services.) Certificate mapping makes it easier for administrators to control access to content located on the Web server.

Notes

Use client certificates when it is important for servers to validate the identity of clients-for example, when your enterprise includes mobile users with laptops who need to remotely and securely access the company's intranet server using Internet Explorer.

See Also digital certificate ,public key cryptography

Client for Microsoft Networks

A networking component in Microsoft Windows 95, Windows 98, Windows Millennium Edition (Me), Windows 2000, Windows XP, and Windows .NET Server that makes it possible to access file and print services on all of the above versions of Windows, as well as Windows NT, Windows for Workgroups, and LAN Manager dedicated servers and peer servers.

Overview

Client for Microsoft Networks works with any combination of NetBEUI, IPX/SPX-Compatible Protocol, and Transmission Control Protocol/Internet Protocol (TCP/IP) protocols. Client for Microsoft Networks cannot be used for accessing non-Microsoft servers such as Novell NetWare servers. You must install Client for NetWare Networks to access these servers. Windows 95 and Windows 98 allow you to install more than one client at a time to access different kinds of servers on the network.

Use the Network utility in Control Panel to install Client for Microsoft Networks on a computer running Windows 95 or Windows 98. Then use the property sheet of Client for Microsoft Networks to configure the computer to either participate in a workgroup or log on to a Windows NT, Windows 2000, or Windows .NET Server domain.

Notes

In Windows NT, the equivalent component is called the Workstation service, but in Windows 2000, Windows XP, and Windows .NET Server, the component is Client for Microsoft Networks, as in Windows 95 and Windows 98.

Client for NetWare Networks

In Microsoft Windows 95, Windows 98, Windows Millennium Edition (Me), Windows 2000, Windows XP, and Windows .NET Server, a networking component that makes it possible to access file and print services on Novell NetWare servers.

Overview

Client for NetWare Networks requires that the IPX/SPX-Compatible Protocol be installed. Client for NetWare Networks cannot be used for accessing Microsoft servers such as Windows NT, Windows 2000, and Windows .NET Server. You must install Client for Microsoft Networks to access these servers. Windows 95 and Windows 98 allow you to install more than one client at a time to access different kinds of servers on the network.

Use the Network utility in Control Panel to install Client for NetWare Networks on a computer running Windows 95 or Windows 98. Then use the property sheet of Client for NetWare Networks to configure the preferred NetWare server, to select the first drive letter to use for mapping network drives from NetWare command-line utilities, and to enable processing of logon scripts on the preferred server.

Notes

Client for NetWare Networks can connect to NetWare 3 and earlier servers, or NetWare 4 servers running in bindery emulation mode. If you want to use Client for NetWare Networks to connect to a NetWare 4 server running Novell Directory Services (NDS), you must also install Service for NetWare Directory Services on the Windows 95 or Windows 98 client. This service is available with Windows 95 OSR2 or Service Pack 1 for Windows 95, and is included with Windows 98.

Before installing Client for NetWare Networks on a computer running Windows 95 or Windows 98, make sure you remove any real-mode NetWare requestor software running on the machine, such as NETX (the NetWare 3.x client shell) or VLM (the NetWare 4.x client shell).

client installation point

A shared directory on a network file server to which users on your network can connect to install client software locally on their client computers.

Overview

Creating a client installation is the first step in preparing to install software over the network. To create a client installation point, create a directory on a server and share the folder with full permissions for administrators and read-only permissions for ordinary users. Either copy the installation files for the software from the CD to the shared directory, or run the setup program using a special switch to copy the files so that they can be used for network installation-for example, to uncompress the cabinet files on the CD. Users can then connect to the shared directory, run the setup program, and complete the installation process.

client/server

A paradigm for deploying two-tiered distributed applications.

Overview

In the client/server model, an application is split into a front-end client component and a back-end server component. The front-end client part of the application runs on a workstation and receives data that is input by the user. The client component prepares the data for the server by preprocessing it in some fashion, and then sends the processed information to the server, usually in the form of a request for some service. The back-end server component receives the client's request, processes it, and returns information to the client. The client receives the information returned from the server and presents it to the user by way of its user interface. Usually most of the processing is done at the back end (server end) where database servers, messaging servers, file servers, and other resources are located.

An example of a simple client/server application is a Web application that is designed for Microsoft Internet Information Services (IIS) using a combination of server-side Active Server Pages (ASP) programming and client-side scripting. The ASP scripts run on the Web server, while the client-side scripts run on the client Web browser.

See Also distributed application

Client Services for NetWare (CSNW)

A Microsoft Windows 2000, Windows XP, and Windows .NET Server service that provides Windows clients with access to Novell NetWare file, print, and directory services.

Overview

Client Services for NetWare (CSNW) is an optional service that can be installed on Windows 2000, Windows XP, and Windows .NET Server machines to enable them to directly connect to file and print resources on Novell NetWare servers. In other words, CSNW is a Microsoft version of the NetWare redirector for Windows 2000, Windows XP, and Windows .NET Server.

Client Services for NetWare (CSNW). How CSNW works.

CSNW is a full-featured, 32-bit client for NetWare networks that can be installed on Windows 2000 Professional or Windows XP Professional by using the Network and Dial-Up Connections utility in Control Panel. If you are connecting to a NetWare 3.12 or earlier server, you must specify a preferred NetWare server for access to its bindery. If you are connecting to NetWare 4, specify the Novell Directory Services (NDS) tree and default context. CSNW supports browsing NDS trees, but it does not support administration of NDS trees.

CSNW supports connections to servers running version 2, 3, or 4 of NetWare, including both bindery emulation and NDS on NetWare 4. CSNW includes support for NetWare Core Protocol (NCP), Large Internet Protocol (LIP), and Long filenames (LFNs). Additional options are included for printing and login script support. CSNW requires installation of the NWLink protocol, but if it is not installed already, it will be added automatically when you install CSNW on a machine.

Notes

On a machine running Windows 2000 Server, NetWare connectivity is provided by Gateway Services for NetWare (GSNW). Use CSNW to provide your Windows 2000 Professional or Windows XP Professional clients with dedicated access to Novell NetWare servers; use GSNW only to provide occasional access to NetWare servers from Windows 2000 Professional or Windows XP Professional clients.

An alternative to using CSNW on Windows 2000 Professional machines is to use the Novell Client for Windows 2000.

See Also bindery ,Gateway Service for NetWare (GSNW) ,Novell Directory Services (NDS) ,NWLink

cloud

In networking, any part of the network whose data transmission paths are unpredictable and vary from session to session.

Overview

Clouds are often used in networking diagrams to represent packet-switching services. In these services, a packet sent from one node to another follows an unpredictable path because, at any given moment, different routers or other devices can be used to forward the packet toward its destination. The Internet is an example of a packet-switching cloud for Transmission Control Protocol/Internet Protocol (TCP/IP) networking because data sent between two points can travel over many possible paths. This is why the Internet is graphically represented as a cloud in drawings of wide area networks (WANs). Other examples of packet-switching services include frame relay and X.25 networks.

Cloud. The Internet depicted as a cloud of paths and connections.

Circuit-switched services are often represented as clouds as well. In circuit-switched services, communication switches at various telco and carrier central offices (COs) and switching facilities are temporarily used for establishing circuits between two communicating nodes. Each time communication is terminated and reestablished, different sets of switches can be used.

See Also telecommunications services

cluster

A group of two or more nodes within a system supporting clustering.

Overview

When a client on a network tries to access shared resources or applications on a cluster, the cluster appears to the client as a single node or server instead of the group of nodes or servers it really is.

In the Cluster service of Microsoft Windows 2000 and Windows .NET Server Enterprise Server and Datacenter Server, each node in a cluster is a completely independent computer system that must be running Windows 2000 Enterprise Server. Typically, such nodes are connected by a shared storage bus such as an external Small Computer System Interface (SCSI) disk subsystem or RAID array.

See Also clustering

cluster-aware application

An application that can run on a node of a cluster and can be managed as a cluster resource.

Overview

In the Cluster service on Microsoft Windows 2000 or Windows .NET Server Enterprise Server and Datacenter Server editions, a cluster-aware application is one that can run on a node of a cluster and can be managed as a cluster resource. Cluster-aware applications can be written to access the Windows 2000, or Windows .NET Server Cluster service by using its cluster application programming interface (API). Cluster-aware applications also implement the extension dynamic-link libraries (DLLs) of Cluster Administrator, which allow them to be managed using Cluster Administrator. These features allow developers to write high-scalability applications that can operate across the different nodes in a cluster.

A cluster-aware application is one that is aware of the fact that it is running on a cluster and can make use of the scalability, load balancing, and failover aspects of clustering to provide high availability for mission-critical business environments. Cluster-aware applications include database applications such as Microsoft SQL Server, messaging applications such as Microsoft Exchange Server, and Web applications for running on Web servers such as Microsoft Internet Information Services (IIS).

See Also clustering

clustering

Any technology that enables two or more servers to appear to clients as a single system.

Overview

A cluster consists of a group of computers functioning together as a unit, running a common set of applications, and presenting a single image to client systems. Clustering can be implemented in various ways, but its basic goals are to provide businesses with high availability, high reliability, and high scalability solutions for mission critical business operations.

Clustering solutions generally come in two basic types:

Stateful clustering solutions themselves generally fall into three different categories, depending on if and how failover occurs between different nodes:

Marketplace

Many different clustering solutions are in the marketplace, but this article focuses on four different clustering technologies delivered by Microsoft platforms and products, namely:

You can find additional information in separate articles on each of these four solutions.

Windows clustering is a feature of Microsoft Windows 2000 Advanced Server and Datacenter Server and of Windows .NET Server. Windows clustering is probably Microsoft's best-known clustering platform and was originally developed for Microsoft Windows NT Server Enterprise Edition where it was code-named Wolfpack during its development. Windows clustering is a stateful clustering solution that enables system architects to create clusters from groups of independent computer systems and to run and manage cluster-aware applications. Using Windows clustering, you can build two-way clusters (that is, clusters with only two nodes) on Windows 2000 and Windows .NET Server Enterprise Server edition or four- way clusters on Windows 2000 and Windows .NET Server Datacenter Server edition (Windows NT Server Enterprise Edition supported only two-way clustering). In Windows clustering a cluster connects nodes together using a shared file system and clusters can utilize active/active clustering for maximum reliability and availability. Windows clustering makes an excellent choice for clustering database and messaging applications for enterprises.

Network Load Balancing (NLB) is a stateless clustering solution included with Windows 2000 and Windows .NET Server Enterprise Server and Datacenter Server editions, and it was formerly called Windows Load Balancing Services (WLBS) on the Windows NT Server 4 platform. NLB provides load balancing of Internet Protocol (IP) traffic to up to 32 independent network nodes (servers) and is typically used to build farms of Web servers or Exchange 2000 Outlook Web Access (OWA) servers for large enterprises. When one node in an NLB cluster goes down, the load is simply redistributed to the remaining nodes.

Application Center 2000 is a part of Microsoft Corporation's .NET Server family, and is a stateless clustering platform designed to provide a single point of management for farms of Web servers. Appcenter is typically used in conjunction with NLB and CLB to provide high availibity, high reliability clustering that can scale out to large numbers of users. Appcenter manages a collection of servers in a Web farm as a single entity and can be used to create new clusters, join servers to existing cluster, remove nodes from clusters, deploy applications and application components to different nodes within a cluster, move components between nodes of a cluster, monitor the performance of a cluster, and manage load balancing of network connections to cluster nodes and COM+ components within a cluster-aware application.

Component Load Balancing (CLB) is supported by all versions of Windows 2000 Server and is used to provide load balancing of COM+ objects across distributed applications deployed on up to 16 nodes (servers). CLB is a stateless clustering solution that requires no special hardware but needs Microsoft Application Center 2000 in order to operate.

See Also Application Center, cluster, cluster-aware application, Component Load Balancing (CLB)

CMAK

Stands for Connection Manager Administration Kit, a wizard-based tool for creating custom connectivity solutions, and a component of Internet Connection Services for Microsoft Remote Access Service (RAS).

See Also Connection Manager Administration Kit (CMAK)

CMP cabling

A grade of cabling that is resistant to combustion.

See Also plenum cabling

CN

Stands for connected network; in Microsoft Message Queue (MSMQ) Server terminology, a name for a collection of computers in which any two computers can directly communicate.

See Also connected network (CN)

CNAME record

Stands for Canonical Name record, a Domain Name System (DNS) resource record for assigning an alias to a host.

Overview

A CNAME record is used to map an alias to the canonical name (true name) of a host on the Internet or a private Internet Protocol (IP) internetwork. The CNAME record thus lets you use more than one name to refer to a single host on the network. If a name server is queried by a resolver to look up a host and the queried name is an alias in a CNAME record, the name server replaces the alias name with the canonical name of the host being looked up and then looks up the address of the canonical name.

Examples

Here is an address record for the host named server12 in the microsoft.com Internet domain. This record has the IP address 172.16.8.5, followed by a CNAME record indicating that the name bobby (or the fully qualified domain name bobby.microsoft.com) is an alias for the same host:

server12.microsoft.com  IN  A  172.16.8.55 bobby                   IN  CNAME  server12

Uses

CNAME records are generally used to hide the true names of important servers on your network from the outside world.

CNRP

Stands for Common Name Resolution Protocol, a proposed Internet Engineering Task Force (IETF) standard for a protocol to replace Uniform Resource Locators (URLs) with a simpler, more natural scheme for navigating the Web.

See Also Common Name Resolution Protocol (CNRP)

CO

Stands for central office, a telco switching facility.

See Also central office (CO)

coax

Short for coaxial cabling, a legacy form of network cabling.

See Also coaxial cabling

coaxial cabling

A legacy form of network cabling.

Overview

Coaxial cabling (or simply coax) is a form of network cabling that was used in legacy 10Base2 and 10Base5 Ethernet networks. The name coax comes from its two-conductor construction in which the conductors run concentrically with each other along the axis of the cable. Coaxial cabling in local area networks (LANs) has been largely replaced by twisted-pair cabling (structured wiring installations) within buildings, and by fiber-optic cabling for high-speed network backbones.

Coaxial cabling. Typical coax cabling.

Coaxial cabling generally consists of a solid copper core for carrying the signal, covered with successive layers of inner insulation, aluminum foil, a copper braided mesh, and outer protective insulation. A solid conductor provides better conductivity than a stranded one, but is less flexible and more difficult to install. The insulation is usually polyvinyl chloride (PVC) or a nonstick coating; the aluminum foil and copper mesh provide shielding for the inner copper core. The mesh also provides the point of grounding for the cable to complete the circuit.

Types

Coaxial cabling comes in various types and grades. The most common are the following:

In addition, a number of special types of coaxial cabling are sometimes used for certain networking purposes. An example is twinax cabling, which consists of two conductors first enclosed in their own insulation and then enclosed in a single copper mesh and insulating jacket. Twinax is used in legacy IBM networks for connecting AS/400 systems to 5250 terminals. Other more exotic varieties include triax, quadrax, and ribbon types of coaxial cables.

Notes

Coaxial cabling is often used in heavy industrial environments where motors and generators produce a lot of electromagnetic interference (EMI), and where more expensive fiber-optic cabling is unnecessary because of the slow data rates needed. Coaxial cabling is also used frequently in IBM mainframe and minicomputer environments. A device called a splitter can be used to fork one coaxial cable into two-for example, when connecting two 3270 terminals to one IBM mainframe system. A splitter is used at either end of the connection so that the signals for both terminals can be sent over a single coaxial cable. Coax multiplexers can be used to connect eight or more terminals to a single controller.

See Also cabling ,fiber-optic cabling ,twinax cabling ,twisted-pair cabling

codec

Short for co mpressor/dec ompressor, an encoding algorithm used for recording digital audio or video.

Overview

A codec compresses transmitted data at the sending end and decompresses it at the receiving end. Microsoft Windows Media Player uses different codecs to provide streaming multimedia information over a Transmission Control Protocol/Internet Protocol (TCP/IP) network such as the Internet. Windows Media Player provides a number of different codecs for different purposes. You can select a codec to give you the audio or image quality and image size that you want for your transmission.

Code Division Multiple Access (CDMA)

A second-generation (2G) digital cellular phone technology popular in the United States and parts of Asia.

Overview

Code Division Multiple Access (CDMA) can be used to refer both to a type of digital cellular phone system and to the specific media access method used by this kind of cellular system. CDMA was developed by QUALCOMM in 1993, and it was adopted and ratified by the Telecommunications Industry Association (TIA) as part of their Interim Standard 95, specifically as TIA standard IS-95a.

CDMA supports combined voice and data over a single channel and supports circuit-switched data transmission at a rate of 14.4 kilobits per second (Kbps), although in practice speeds are more typically around 13 Kbps. Speeds up to 19.2 Kbps are also possible by using special error detection and correction techniques.

Architecture

CDMA uses the spread spectrum wireless networking technology-first developed for military communication systems in the 1940s because it spreads its transmission over a large bandwidth, making it difficult to jam. Instead of dividing the available radio spectrum into a series of discrete channels using the older Time Division Multiple Access (TDMA) media access method, a CDMA channel occupies the entire available frequency band. In other words, all CDMA users on a given network utilize the same frequency band.

What enables users to share the same spectrum is that CDMA assigns a special digital code sequence to each user. Users thus share time and frequency resources on the available bandwidth, and their individual communications are channeled using these codes. The code tag identifies the conversation to the transmission station and enables multiple users to simultaneously access the network and divide its frequency resources between them-hence the name Code-Division Multiple Access.

Without knowledge of a conversation's code tag, eavesdropping on CDMA conversations is difficult, making CDMA a more secure cellular phone technology than the Advanced Mobile Phone Service (AMPS) still used widely in the United States. CDMA also has a much higher call capacity than AMPS and is comparable to the Global System for Mobile Communications (GSM) standard for cellular communication used in Europe. The disadvantage is that CDMA is more complex to implement than TDMA digital cellular technologies.

Marketplace

The main CDMA-based system in the market today is QUALCOMM's cdmaOne, the operation of which is now supervised by the CDMA Development Group and independent organization. The cdmaOne system uses 64 different codes called Walsh sequences, and in theory thus supports up to 64 concurrent users talking over a single 1.25-megahertz (MHz)-wide channel. In practice, however, this works out to more like 20 concurrent users, especially when data transmissions are included. The cdmaOne system has approximately 30 million users in the United States and Asia, with its competitors being Global System for Mobile Communications (GSM), which has 150 million users worldwide; Digital Advanced Mobile Phone Service (D-AMPS), with 15 million users in the United States; and Personal Digital Cellular (PDC), with 45 million users in Japan.

A special upgrade to cdmaOne called IS-95b provides improved data speeds of up to 115 Kbps, though real speeds are usually more like 64 Kbps (the version of IS-95b in Japan and Korea supports packet-switched data rates of only 64 Kbps). Further proposed 2.5G and third-generation (3G) improvements fall under the umbrella name of CDMA2000, and the CDMA technology itself forms the basis of much of the proposed IMT-2000 standard for 3G cellular communications from the International Telecommunication Union (ITU).

Another cellular system in the United States based on CDMA technologies is Sprint PCS from Sprint Corporation, which operates at a higher frequency band than cdmaOne but uses CDMA as its media access control method.

Notes

CDMA does not assign specific frequencies to each user as do other competing systems. Instead, CDMA uses a unique technique where every channel uses the entire available spectrum. CDMA was developed and first used by the military during World War II by the English to thwart German attempts at jamming transmissions. The Allies utilized CDMA to transmit over different frequencies, instead of one, which made it extremely difficult for the Germans to pick up entire signals.

For More Information

You can find the CDMA Development Group at www.cdg.org QUALCOMM is at www.qualcomm.com

See Also 2G, 2.5G, 3G, Advanced Mobile Phone Service (AMPS), CDMA2000, cellular communications, Global System for Mobile Communications (GSM), Time Division Multiple Access (TDMA)

Coded Orthogonal Frequency Division Multiplexing (COFDM)

A technique for enhancing the speed of wireless networking.

Overview

Coded Orthogonal Frequency Division Multiplexing (COFDM) is employed by the 802.11a wireless networking standard as a way to work around the difficulty of radio frequency (RF) interference caused by scattering and reflection off of buildings, walls, and similar objects. The problem with wireless networking, as opposed to wireline (wired) networking, is that although wireline networks usually have a single path between different stations, wireless communication is often multipath. As the figure shows, a signal can travel between a wireless client and a base station along different paths due to reflection of RF signals off walls and other objects. The result is that when the signal arrives it is spread out in time. If the time over which a signal can be spread out by interference (the delay spread) is less than the time between individual packet transmissions (the symbol rate), then the receiver can still be processing one packet while the next one arrives, creating a problem.

COFDM works around this problem not only by slowing down the symbol rate (the rate of packet transmission) but also by cramming as much information as possible into each packet. COFDM thus transmits data in a massively parallel fashion, ensuring that each symbol can be processed in a time less than the delay spread between divergent signal paths. Each symbol transmitted is proceeded and followed by a cyclic prefix called a guard interval, which helps give the baseband processor time to receive and process the information. Additional error-correcting information is encoded to help reduce the effects of interference.

Coded Orthogonal Frequency Division Multiplexing (COFDM). COFDM helps overcome the delay spread caused when signals are reflected off of interfering objects.

Using COFDM, wireless networks based on 802.11a can break through their current speeds of 10 to 20 megabits per second (Mbps) to achieve speeds of 155 Mbps or even higher.

See Also 802.11a ,wireless networking

code-operated switch

A switch with a combination of input and output ports, the connections between which can be remotely reconfigured by commands entered into a computer.

Overview

Code-operated switches are useful in environments where remote switching is needed for file-sharing or monitoring purposes. For example, you could use an RS-232 serial code-operated switch to remotely switch between pieces of data terminal equipment (DTE), such as servers or routers for running diagnostics from a remote console.

Code-operated switch.

Implementation

Internal dual inline package (DIP) switches are usually used to configure the code-operated switch so that a different arming character can be used to trigger each connected device. The code-operated switch then examines the incoming data stream for these special text-string codes in order to determine to which device it should route data. An example might be the remote switching between printers. A remote computer could send an embedded switching character to specify which printer connected to the code-operated switch should be used for printing the data.

A remote user can connect to the company network using a modem that interfaces with a code-operated switch, and then use the switch to control a variety of serial-controlled devices in an industrial environment, such as a group of laboratory instruments. Code-operated switches are available from different vendors in configurations supporting up to 64 different serial devices from one remote connection.

Besides embedding switching characters in the data stream, embedded control characters can also be used to directly control the code-operated switch.

See Also switch

COFDM

Stands for Coded Orthogonal Frequency Division Multiplexing, a technique for enhancing the speed of wireless networking.

See Also Coded Orthogonal Frequency Division Multiplexing (COFDM)

cold boot

Restarting the computer by turning the power switch off and then on, or by shutting down the computer, turning it off, and then turning it on again.

Overview

If you perform the first type of rebooting, open files will not be properly closed and data can be lost. However, this method ensures that memory is cleared and devices are properly reset. An example might be when you reconfigure the settings of a legacy modem using the modem utility in Control Panel. You might find that you must cold boot your machine in order for the new configuration settings to fully take effect.

See Also boot

Cold Fusion

A popular tool for developing dynamic Web applications.

Overview

Cold Fusion from Allaire Corporation lets developers rapidly create and deploy dynamic Web applications that can access information from databases and other data sources. Cold Fusion uses a set of proprietary tags that are similar to Hypertext Markup Language (HTML) tags. The resemblance to HTML tags makes Cold Fusion a comfortable platform for experienced HTML users to develop database-driven applications that can be accessed from Web browsers. Cold Fusion is available for both UNIX and Microsoft Windows platforms, and it is an alternative to Microsoft Corporation's Active Server Pages (ASP) technology for developing dynamic Web applications.

For More Information

Find out more about Cold Fusion at www.allaire.com

See Also Active Server Pages (ASP)

Collaboration Data Objects (CDO)

A collection of Component Object Model (COM) objects that allow developers to create Microsoft Internet Information Services (IIS) Web applications that send and receive electronic mail.

Overview

Collaboration Data Objects (CDO) is a Microsoft object library that provides messaging capability for applications written in Microsoft Visual Basic, Microsoft Visual C++, and Win32 Virtual Machine for Java. CDO provides distributed Web applications with a standard way to quickly and easily create, send, post, receive, read, and manipulate messages using interfaces based on standard Internet protocols such as Simple Mail Transfer Protocol (SMTP), Network News Transfer Protocol (NNTP), and Multipurpose Internet Mail Extensions (MIME).

CDO was formerly known as Active Messaging, and on the Microsoft Windows NT platform was called Collaboration Data Objects for Windows NT Server (CDONTS). CDONTS actually provides a subset of CDO functionality that includes messaging services but omits the calendaring and workflow functions that CDO on Microsoft Exchange 2000 provides.

CDO 2 is included with IIS in Windows 2000, Windows XP, and Windows .NET Server to support the built-in SMTP and NNTP services. CDO 2 does not support mailboxes, but it does support protocol events to enable programmers to write routines that respond to incoming messages and process outgoing messages. Developing mail-enabled applications using CDO is easier and faster than building custom Common Gateway Interface (CGI) mail programs, and CDO applications have more flexibility than typical CGI applications.

CDO is also a powerful development tool for Exchange Server 2000 and is the premier application programming interface (API) for building collaborative solutions using Exchange. CDO in Exchange 2000 consists of three components:

Notes

For security reasons, scripts running on Microsoft Internet Explorer cannot access CDO.

See Also Exchange Server ,Internet Information Services (IIS)

collapsed backbone

An enterprise networking methodology in which the network backbone consists of a single device.

Overview

In a traditional network, local area networks (LANs) are multipoint connections connected using a backbone cable. For example, in a building, a fiber-optic backbone might run from floor to floor and connect with a hub in a wiring closet on each floor. In contrast, collapsed backbones make use of centralized switches, which provide virtual point-to-point connections for LAN connections. These switches are located in the same place as the network servers-in fact it was the move toward centralized location of network servers that helped drive the development of collapsed backbones.

In a typical collapsed backbone scenario, instead of having a hub for each floor located in that floor's wiring closet, a set of stackable Ethernet switches would be located in the equipment room in the basement, with individual cables running from this closet through vertical rises to wiring closets on each floor where hubs distribute connections to stations in work areas.

Advantages and Disadvantages

The advantages of using a collapsed backbone are that they eliminate the costs of backbone cabling installation, they require fewer devices, their equipment administration is more centralized, and they offer higher available bandwidth for each station. The disadvantages are that collapsed backbones generally are not feasible for use in more than one building, they require more cabling, they use more expensive devices, and they have a more limited distance capability.

See Also backbone ,network

collision

A condition that occurs when two or more computers on a network try to transmit signals over the same wire at the same time.

Overview

Collisions are inevitable on a network as long as there is more than one computer on the network. Handling collisions is one of the main functions of a network access method. For example, in Ethernet networks, collisions often occur when two or more stations attempt to place frames on the wire at the same time. To handle this situation, Ethernet uses the access method called Carrier Sense Multiple Access with Collision Detection (CSMA/CD).

When a station begins transmitting a signal and detects a collision, the station stops transmitting and issues a jam signal to tell the other station that a collision has occurred. Both stations then stop transmitting and wait a random length of time before retransmitting their signals. The amount of time the stations wait before retransmitting increases with the number of collisions occurring on the network.

See Also Carrier Sense Multiple Access with Collision Detection (CSMA/CD) ,collision domain Ethernet

collision domain

An area of a network where signals transmitted by different stations with that area can collide.

Overview

In Carrier Sense Multiple Access with Collision Detection (CSMA/CD) networks such as Ethernet, a collision can occur if two computers on the network attempt to transmit signals at the same time. When a collision occurs, the network is momentarily offline and no computers can communicate on it.

The larger the collision domain of an Ethernet network, the more computers present and the higher the probability of collisions occurring and negatively affecting network performance. When collision domains become too large, so many collisions occur that network communications become possible. As a result, it is important to segment Ethernet networks to keep collision domains small enough that the effect of collisions is minimized on the network.

Segmenting a collision domain can be accomplished using bridges, switches, routers, and other devices. For example, if two Ethernet hubs are connected directly to a third hub, the resulting local area network (LAN) is still only a single collision domain because only hub connections are used between segments of the network. But if the two hubs are directly connected to an Ethernet switch, you have two collision domains because the switch enables the two networks to function independently. Routers also segment networks into broadcast domains to prevent the occurrence of broadcast storms.

See Also broadcast domain, broadcast storm, Carrier Sense Multiple Access with Collision Detection (CSMA/CD), collision, Ethernet

COM

Stands for Component Object Model, an object-based software architecture developed by Microsoft Corporation that allows applications to be built from binary software components.

See Also Component Object Model (COM)

COM+

An extension of Microsoft Corporation's Component Object Model (COM).

Overview

COM was originally designed for building component-based applications to run on single systems. Distributed COM (DCOM) was an evolution of COM that enabled COM components to reside on different machines and communicate with each other over the network. COM+ takes DCOM a step further by providing services and features that enable large, distributed, multitier applications to be built for enterprise-wide systems and the Internet.

COM+ is part of the Microsoft Windows Distributed Network Architecture (DNA) programming paradigm. The COM+ that is supported by the Microsoft Windows 2000, Windows XP, and Windows .NET Server operating system platforms is basically COM plus Microsoft Transaction Server (MTS) and Microsoft Message Queue Server (MSMQ), minus some legacy COM functionality no longer needed. Some of the enhancements of COM found in COM+ include the following:

See Also Component Object Model (COM) ,Distributed Component Object Model (DCOM)

COM component object

A compiled software component based on Microsoft Corporation's Component Object Model (COM) technology.

Overview

COM components generally refer to the physical files that contain the classes that define COM objects. COM components also include additional code, such as code to register the component in the registry and code for loading the component.

COM components can be written in many languages using tools such as Microsoft Visual Basic, Microsoft Visual J++, Microsoft Visual C++, and Microsoft Visual FoxPro. COM components that support Automation can be called by scripting languages such as Microsoft Visual Basic, Scripting Edition (VBScript) or Microsoft JScript.

COM component object. In-process, local, and remote COM components.

COM components can be run on an application server, a Web server, a Microsoft Transaction Server (MTS), or a client. COM components can be stand-alone applications or reusable software components, and they make the development of Web applications comparable to the development of system applications.

COM components interact with each other and with user applications in a client/server fashion. The client therefore uses the functionality of the server component by creating instances of classes that the server component provides and calling their properties and methods.

COM components can be designed to run in three different modes:

An in-process COM component has the extension .ocx or .dll, while an out-of-process COM component (one running outside the calling application process) has the extension .exe. COM components can run on another machine in a manner transparent to the calling application by using the Distributed Component Object Model (DCOM).

When developing applications based on COM components, use in-process components to optimize the speed of object access but use out-of-process components to maximize thread safety.

See Also Component Object Model (COM)

command

A method by which actions can be performed on a computer running Microsoft Windows by typing text into a command prompt window. The commands that are available depend on which version of Windows is used.

Overview

Examples of commands common to most Windows platforms include the Attrib command, Cacls command, Copy command, Dir command, and Diskcopy command. In addition to these Windows commands, some special commands are available only when certain networking services or protocols are installed. For example, if Transmission Control Protocol/Internet Protocol (TCP/IP) is installed on a computer running Windows, a number of TCP/IP commands are available, including the Arp command, Ping, Tracert, and Nbtstat.

Commands are useful for administering different aspects of a system or network using a command-line interface, such as a telnet connection or a command prompt. Commands are also often used in writing batch files that can perform a group of operations on a system or network service. You can run such a batch file directly, or you can schedule its operation for a predetermined time.

Finally, many Windows programs can be started in different ways from the command prompt using optional switches. For example, Windows Explorer can be run by typing explorer.exe from the command prompt. These programs are normally run using a graphical user interface (GUI), are started by desktop shortcuts, and are not usually referred to as commands.

See Also UNIX commands ,Windows commands

command interpreter

The underlying service or daemon that supports a command-line interface.

Overview

The command interpreter is a system process that allows users to type text commands into the command line or command prompt and execute them to perform various routines and manage system and networking resources. Traditional UNIX systems make heavy use of the command line, while MS-DOS, the legacy Microsoft operating system, is basically a command shell for running text-based commands to control operating system processes.

On Microsoft Windows 2000, Windows XP, or Windows .NET Server systems, users can open a command prompt window to issue text-based commands to the underlying command interpreter Cmd.exe. These text-based Windows commands represent only a subset of the full functionality of the GUI-based administration tools available on the Windows 2000, Windows XP, and Windows .NET Server platforms.

The command interpreter is sometimes referred to as the operating system shell, especially on UNIX platforms. Entering a command into the command interpreter is referred to as "working at the command line."

See Also command line ,command prompt

command line

A general name for any user interface that allows text-based commands to be entered and executed on a system. The term command line is popular in UNIX environments, but Microsoft Windows systems use command prompt to mean essentially the same thing.

See Also command interpreter ,command prompt

command prompt

A Microsoft Windows application that allows text- based Windows commands to be entered and executed.

Overview

The Windows command prompt provides a command-line interface (CLI) similar to those provided by UNIX systems. The command prompt can be used for running operating system tasks, configuring networking services, and even accessing resources and applications over the network. Many common administrative tasks can be performed from the command prompt, although the command prompt itself provides a more complex and less intuitive interface than the usual desktop graphical user interface (GUI) of Windows operating systems. However, administrators who have spent significant time working in UNIX networking environments often find the command prompt a more familiar paradigm for administering a Windows-based network.

Command prompt. The command prompt in Windows 2000.

Notes

In Windows 2000, Windows XP, and Windows .NET Server, the command prompt application is Cmd.exe, located in the %SystemRoot%\system32 folder. In Windows Millennium Edition (Me), it is called the MS-DOS prompt, has the executable filename Command.com, and is in the \Windows folder. The Windows 2000, Windows XP, and Windows .NET Server versions can be configured using the Console utility in Control Panel.

For security reasons, should you wish as an administrator to disable the command prompt on a Windows 2000, Windows XP, or Windows .NET Server machine, you can accomplish this by either renaming Cmd.exe to something only you yourself are aware of, set NTFS file system (NTFS) permissions so that only Administrators can access it, or (not recommended) delete Cmd.exe entirely from the system.

See Also command interpreter

Commerce Server 2000

Microsoft Corporation's platform for building and managing e-commerce solutions.

Overview

Commerce Server 2000 reduces the time it takes to develop and deploy complex e-commerce solutions. Commerce Server is based on Microsoft Site Server version 3 Commerce Edition (SSCE), and it builds on the strength of this earlier product. Commerce Server is part of the Microsoft Windows .NET Server family.

Commerce Server provides core services for managing your e-commerce site, including

In addition to these services, Commerce Server includes administration and development tools for building and managing your site, sample e-commerce sites you can use as templates and models, a data- warehousing decision-making system, help-desk customer support functionality, and much more.

For More Information

Find out more at www.microsoft.com/commerceserver/.

See Also .NET platform

commercial service provider (CSP)

Internet service providers (ISPs), online service providers, telephone and cable network operators, and other companies.

Overview

CSPs provide software services such as community access to mail, news, chat, and conferencing services. By utilizing these services of a CSP, customers do not have to acquire licenses for the software the CSP provides.

See Also xSP

Committed Information Rate (CIR)

A way of guaranteeing bandwidth in frame relay services.

Overview

Committed Information Rate (CIR) provides a way of guaranteeing minimum bandwidth for frame relay customers. Because customers on a frame relay network share the network, it is possible that service providers might oversubscribe the service-with the result that some customers receive insufficient bandwidth. Another situation where this can be a problem is if many customers try to access the frame relay network at the same time.

CIR guarantees that data throughput on frame relay connections will not drop below a previously agreed- upon contractual lower limit. However, CIR does permit short bursts of traffic to occupy greater amounts of bandwidth.

See Also frame relay

Common Desktop Environment (CDE)

A graphical user interface (GUI) or desktop environment developed for UNIX systems.

Overview

Common Desktop Environment (CDE) was developed by IBM, Sun Microsystems, and Hewlett-Packard under the Common Open Software Environment (COSE) initiative. CDE is a paradigm that is widely used in the UNIX industry. CDE is based on various industry standards including the X Window System (X11) release 5, X/OPEN, OSF/Motif 1.2, and others.

CDE is designed to provide UNIX users with a simple and consistent desktop interface that includes

See Also UNIX ,X Window System

Common Gateway Interface (CGI)

A mechanism by which a Web browser can request a Web server to execute an external application.

Overview

Common Gateway Interface (CGI) was developed in the UNIX networking environment to allow Web browsers to execute "gateway" applications on Web servers. These gateway programs are typically written either in a compiled language such as C or in an interpreted language such as Perl. CGI allows Web servers to run scripts or programs on the server and send the output to the client Web browser, thus turning the Web into a platform for running dynamic applications instead of merely presenting static information to clients.

Architecture

CGI programs are called "gateway" programs because the Web server passes the CGI request to the external program, which then runs as a separate process to process the input data, generate the results, and pass these results back to the Web server, which then returns them properly formatted in Hypertext Markup Language (HTML) to the client.

The main disadvantage of CGI is that each request must spawn a new CGI process and that, after the request is satisfied, the process is killed. Thus a Web server experiencing multiple simultaneous requests from clients will spawn multiple copies of the gateway process, each of which consumes memory and processing overhead. The fact that processes are terminated at the end of each request limits CGI to single-step Web applications and requires much ingenuity to handle data across a multistep user session.

Examples

CGI applications are often used as form handlers for Web forms, and are executed using a <FORM> tag embedded in the form document. When a Web client such as Microsoft Internet Explorer submits a form or otherwise passes information to a Web server using CGI, the Web server receives the information from the client and passes it to the gateway program for processing. The gateway program then returns the result of the processing to the server, which returns it to the Web browser as an HTML page. Here's a simple example:

<FORM METHOD=POST ACTION= "http://www.northwind.microsoft.com/cgi-bin/results.pl">

In this example, the Perl script results.pl in the cgi-bin directory functions as the form handler for processing the information submitted using the form.

Common Gateway Interface (CGI). How CGI works.

Notes

Although CGI was developed for UNIX-based systems, it is supported by most Web servers, including Microsoft Internet Information Services (IIS). Microsoft Internet Server API (ISAPI) is a set of server extensions for IIS that functions similarly to those of CGI but uses fewer resources. The main difference is that with CGI the system creates a unique process for every CGI request, but ISAPI extensions do not require separate processes. This makes ISAPI applications generally more responsive than CGI applications.

See Also Internet Server API (ISAPI) ,UNIX ,Web server

Common Information Model (CIM)

A schema for defining manageable network objects.

Overview

The Common Information Model (CIM) defines a set of schema for describing information collected for network and systems management purposes. CIM was developed by the Distributed Management Task Force (DMTF), formerly named the Desktop Management Task Force, as an extensible, object-oriented schema for managing information collected from computers, networking devices, protocols, and applications.

CIM supports management of two types of objects:

Another way of defining the different types of information that can be described by CIM is as follows:

Uses

CIM is similar to the Simple Network Management Protocol (SNMP) and Desktop Management Interface (DMI) standards. However, unlike SNMP and DMI, CIM is able to manage the widest possible range of hardware and software systems. CIM also shows the relationships between the different hardware and software components of an enterprise network more completely, making it easier to troubleshoot complex distributed systems and applications.

CIM information that is collected can be shared between systems on a peer-to-peer basis. This information sharing allows network devices to not only be managed from a centralized management console but also to talk to one another to resolve problems as they arise.

CIM was designed by the DMTF to operate together with their Web-Based Enterprise Management (WBEM) initiative to provide a broad WBEM/CIM framework for managing resources across a network.

Architecture

CIM is based on an object-oriented programming model that allows inheritance to be used to grant subclasses the characteristics of their parent classes. CIM classes have the properties, methods, and associations typical of object classes. CIM supports both physical and logical objects and models these objects for purposes of network management applications. CIM is also extensible and allows vendors to define the features of their products using inherited subclasses. The fact that these subclasses are inherited from standard parent classes ensures that data collected from different vendors' systems will be compatible with the CIM standard.

CIM consists of two parts: a language definition specifying the constructs and methods that can be used to model network and system resources, and a set of schema that describes how specific types of resources will be represented.

CIM supports three kinds of schema:

Notes

Microsoft Systems Management Server (SMS) 2 is capable of collecting CIM data from managed systems and exporting this data to other enterprise management applications, such as NetView from Tivoli Systems and Unicenter from Computer Associates.

See Also Distributed Management Task Force (DMTF) ,Web-Based Enterprise Management (WBEM)

Common Internet File System (CIFS)

A public version of the Server Message Block (SMB) file-sharing protocol that has been tuned for use over the Internet.

Overview

Common Internet File System (CIFS) is a remote file system access protocol that enables groups of users to collaborate and share documents over the Internet or within corporate intranets. CIFS is an open, cross-platform technology that is based on the native file-sharing protocols of Microsoft Windows platforms. It is supported by other platforms such as UNIX.

CIFS has been viewed as a possible replacement for both the File Transfer Protocol (FTP) and the Network File System (NFS) file system protocols. CIFS supports encrypted passwords and Unicode filenames, and it can be used to mount a remote file system as a directory or drive on the local machine. CIFS also includes features not supported by NFS, including write-ahead and native support for locks. Microsoft Corporation's Distributed file system (Dfs) is covered as part of the CIFS specification.

Microsoft has submitted CIFS to the Internet Engineering Task Force (IETF). CIFS client and server software is available for the Windows 2000 operating system platform.

See Also Server Message Block (SMB)

Common Name Resolution Protocol (CNRP)

A proposed Internet Engineering Task Force (IETF) standard for a protocol to replace Uniform Resource Locators (URLs) with a simpler, more natural scheme for navigating the Web.

Overview

The existing Internet naming systems (domain names and URLs) are not particularly user friendly, as anyone knows who has ever picked up the phone and heard someone ask, "What is the URL for [name of Web page]?" After tediously repeating a long string of characters and slashes, you begin to wish the Internet community could come up with something different.

Enter the proposed Common Name Resolution Protocol (CNRP), an initiative of Network Solutions, AT&T, and other companies. Using CNRP, users could enter the name of a company into their browsers to reach the company home page, then enter a product name to reach the page for a particular product, and enter "2000 Sales Figures" to retrieve a document with these figures. Areas where CNRP might excel include government and public information portals and corporate intranets. Wireless Internet access may also benefit by eliminating the need to enter long, complex URLs on small keypads in order to access specific content on the Internet.

Architecture

CNRP basically runs on top of Hypertext Transfer Protocol (HTTP) as an Extensible Markup Language (XML)-encoded service. A user could enter "Go:2000 Sales Figures" into the browser's address bar, and the browser would encode this request in XML and forward it to a CNRP name server. The name server would then return the URL of the requested page to the browser, which would then request the actual content from where it is located on the Internet or corporate intranet.

Common Name Resolution Protocol (CNRP). How the CNRP works.

Current Web browsers do not support CNRP, and until they do, users who want to use this service will have to download a plug-in for their browser to provide this functionality. Network Solutions offers a free, downloadable CNRP plug-in, as do several other vendors. Whether CNRP will become widely used will depend largely on social inertia (most people are used to URLs despite being fed up with them) and on whether CNRP is natively supported by the next release of Microsoft Internet Explorer and other Web browsers.

See Also Uniform Resource Locator (URL)

Common Object Request Broker Architecture (CORBA)

A component architecture that specifies technologies for creating, distributing, and managing component programming objects over a network.

Overview

Common Object Request Broker Architecture (CORBA) was developed by the Object Management Group and its member companies and was designed to provide interoperability between applications in heterogeneous distributed environments.

In a CORBA environment, programs request services through an object request broker (ORB), which allows components of distributed applications to find each other and communicate without knowing where applications are located on the network or what kind of interface they use. ORBs are the middleware that enable client and server programs to establish sessions with each other, independent of their location on the network or their programming interface.

The process of a client invoking a call to an application programming interface (API) on a server object is transparent. The client issues the call, which is intercepted by the ORB. The ORB takes the call and is responsible for locating a server object that is able to implement the request. When it has located such an object, the ORB invokes the object's method and passes it any parameters submitted by the client. The results are then returned to the client. ORBs communicate among themselves using the General Inter-ORB Protocol (GIOP) or the Internet Inter-ORB Protocol (IIOP) so that any ORB can fulfill any client request on the network.

Uses

CORBA is primarily used in the UNIX world as an underlying architecture for developing distributed applications. CORBA is not natively supported by Microsoft Windows, which uses its own distributed object management architecture called Distributed Component Object Model (DCOM). The OMG has indicated, though, that it plans to include support for Microsoft's new C# programming language in CORBA, which should promote interoperability between UNIX applications using CORBA and Web services developed under Microsoft Corporation's new .NET platform.

For More Information

Find out more about CORBA from the Object Management Group at www.omg.org

See Also C# ,Distributed Component Object Model (DCOM) ,.NET platform ,UNIX

community

A group of hosts managed by Simple Network Management Protocol (SNMP) running SNMP agents.

Overview

Communities provide a simple way of partitioning and securing a network for SNMP management. SNMP agents and management systems use community names as the mechanism for authenticating SNMP messages. All SNMP agents belonging to the same community share the same community name, which functions as a kind of shared password for those agents so that they can be recognized by the SNMP management program and other agents. SNMP messages sent by SNMP management systems to a specific community are accepted only by hosts configured to belong to that community. If an SNMP agent program receives an SNMP message with a community name that it is not configured to recognize, it typically drops the message and sends a trap message to the SNMP management program indicating that a message was not authenticated on that machine.

Notes

An agent can be a member of one or more communities. By default, all agents belong to the public community. If all community names including public names are removed from an SNMP-managed host, the host will accept all SNMP messages sent to it.

See Also agent ,Simple Network Management Protocol (SNMP)

Competitive Local Exchange Carrier (CLEC)

A telco that competes with incumbent telcos under the terms of the Telecommunications Act of 1996.

Overview

Before 1996, the U.S. telecommunications market was dominated by a small group of telcos called Incumbent Local Exchange Carriers (ILECs) or Regional Bell Operating Companies (RBOCs) and a group of long- distance carriers or inter-exchange carriers (IXCs). The Telecommunications Act of 1996 was designed to open things up by allowing new companies to compete with the established ones in both the local and long- distance markets.

Competitive Local Exchange Carriers (CLECs) generally compete with ILECs for provisioning the local loop market, but unlike ILECs, which focus more on residential and large enterprise customers, many CLECs have targeted the small to mid-sized business market that has traditionally been poorly served by ILECs. CLECs generally offer high-speed data services and often focus on specific niche services such as Digital Subscriber Line (DSL)-these are often known instead as DSL providers-but many CLECs also offer a much wider spectrum of services including voice (local and long-distance), high-speed Internet access (using DSL), virtual private networks (VPNs), and business-to-business data links.

CLECs come in many types and range from smaller start-ups that piggyback on ILECs and purchase services wholesale from them for reselling purposes, to larger start-ups building out new fiber from their own switching centers, to large IXCs such as AT&T (which acquired Teleport, a pioneering CLEC) and MCI WorldCom (which bought MFS, another pioneer CLEC) competing in the local telco market.

Like ILECs, CLECs are generally concerned about provisioning buildings, not individual users. However, some CLECs are also getting into the Building Local Exchange Carrier (BLEC) markets by offering to-the-desktop services for building-out wiring and deploying services not just to buildings but also within them.

Advantages and Disadvantages

One of the advantages that CLECs have over traditional ILECs is that, instead of competing directly with ILECs by building switching centers, building out wiring to customer premises, and purchasing expensive Class 5 telephone switches to handle all-important voice traffic, they can save implementation costs considerably by colocating their switching equipment at ILEC COs, sharing the existing local loop infrastructure owned by ILECs, and focusing on purchasing more modern, less expensive switching gear dedicated to specific uses such as DSL. Using less expensive and more modern equipment theoretically means the CLEC can offer its services at a discount compared to the ILEC, but CLECs also have to pay the ILECs for the right to use their services, including line provisioning and maintenance, switching interconnects, and colocation services.

Competitive Local Exchange Carrier (CLEC). Two ways CLECs can provision customers with voice and data services.

On the other hand, contracting CLECs to provision telecommunication services for your company instead of ILECs has an element of risk. This is evidenced by the changing nature of the CLEC market, in which some startups have failed and others have been acquired, and by litigation initiated by some CLECs against ILECs. An example is Pronto, a project of mega-bell SBC Communications, which is building out thousands of neighborhood DSL remote terminals to shorten customer DSL connections, thereby improving DSL reliability and data rates. CLECs that want to provide their own DSL services to the same customers have complained to the Federal Communications Commission (FCC) that Pronto cuts them out of the loop because they cannot service Pronto customers using DSLAMs colocated at SBC's COs. Other RBOCs are contemplating similar projects, which could undercut the operations of many CLECs.

Implementation

Because the ILECs own the infrastructure of the last-mile (local loop) wiring serving residential and business markets in the United States, the Telecommunications Act required ILECs to open up use of the local loop to CLECs, allow CLECs to colocate their equipment at the ILEC central offices (COs), and allow CLECs to lease use of the local loop from the ILECs that provision it. CLECs can architect to provision services in many ways, two of which are shown in the diagram.

The top part of the diagram shows a DSL modem at the customer premises that connects the customer's local area network (LAN) over the local loop to a DSL Access Multiplexer (DSLAM) colocated by the CLEC at the CO of the customer's incumbent telco. The CLEC's DSLAM is connected to the ILEC's switching backbone to provide the customer with voice and data services. Such an arrangement is typical of a CLEC that functions as a DSL provider.

The bottom part shows an Integrated Access Device (IAD) at the customer premises. The IAD converts the Internet Protocol (IP) packets of the customer's Ethernet LAN to Asynchronous Transfer Mode (ATM) cells for transmission over the T1 line to an ATM switch colocated by the CLEC at the ILEC's CO. In this case, the ILEC is responsible for provisioning the T1 for the CLEC and acts as a wholesaler of T1 services toward the ILEC. The CLEC's ATM switch then filters the voice and data traffic from the customer. The voice traffic is routed either to the ILEC's telephone switch or directly to an IXC, while the data traffic is routed to an ISP for Internet access or to an IXC for long-haul wide area network (WAN) connections to branch offices.

Marketplace

The CLEC landscape is constantly changing, but some of the bigger players include Covad Communications Company (www.covad.com), Intermedia Communications (www.intermedia.com), Cogent Communications (www.cogentco.com), and others. Despite these big players and the large number of smaller CLECs on the market, analysts estimate that CLECs currently have less than 10 percent of the local telecom market, with more than 90 percent still in the hands of the incumbent ILEC/RBOCs.

CLECs that provision DSL services typically pay RBOCs about $15 to $25 per month to use their local loop connection for deploying such services, the cost of which must be recovered when they resell such services to businesses and consumers, typically at $40 to $60 per month. A newer technology called line sharing may lower the cost for CLECs to lease lines from ILECs, and the savings might be passed on to consumers.

Prospects

Times have gotten tough in the telecommunications industry in general at the start of the new millennium. After the dot-com crash of 2000, sources of venture capital for new telecom startups has dried up, leaving some CLECs in financial difficulty (the same difficulties are faced by 3G wireless vendors and other segments of the telecom sector). Although a few CLECs have failed and others have been acquired, there were still about 200 different CLECs in the marketplace in 2001, with a market capitalization of about $6 billion.

One aim of the Telecommunications Act of 1996 was to open the doors for cable TV companies and utilities to begin competing with ILECs for residential and business voice and data services. When the act was passed, these companies were slow to build out these services, and a diverse host of CLECs appeared to compete in the residential, office, and metropolitan marketplaces. Now, however, cable companies and utilities are beginning to deploy high-speed data services in large rollouts, and so now many CLECs face competition on two fronts instead of from just the ILECs. Finally, FCC rulings have begun to come down on the side of large carriers, which may squeeze many smaller startups out of the marketplace or lead to their being acquired by big carriers such as AT&T and SBC.

The shakeout in the CLEC market and its uncertain future makes it advisable for businesses to use due diligence in investigating the financially viability of CLECs before deploying mission-critical WAN services just to save costs over similar services offered by RBOCs. Many enterprise network architects believe that leasing reliable services for WAN and Internet access from large RBOCs is more important than saving a few dollars by using CLECs. On the other hand, some e-commerce companies have chosen to go with CLECs because they can typically provision services much faster than traditional RBOCs. CLECs that are building out their own infrastructure (own their own fiber) are probably more likely to succeed in the long term. Enterprise network architects should also consider purchasing redundant services from different carriers to provide fault-tolerance for their WAN connections, but they should realize that as the CLEC market consolidates, their options may narrow.

For More Information

You can find industry news on CLECs at www.clec.com and www.clec-planet.com. A current list of CLECs can be found at www.dslreports.com/clecs.

See Also carrier ,Digital Subscriber Line (DSL) ,Incumbent Local Exchange Carrier (ILEC) ,inter-exchange carrier (IXC) ,line sharing ,local loop ,Regional Bell Operating Company (RBOC) ,telco

complete trust model

A domain model in Microsoft Windows NT in which every domain trusts every other domain with two-way trusts.

Complete trust model. Shown for Windows NT.

Overview

The complete trust model is rarely implemented in Windows NT-based networks unless the motivation for using Windows NT is being driven from the bottom up. For example, if a number of individual departments start implementing domains, the company might soon find itself implementing the complete trust model in order to make administration of these domains more efficient. This model also might be used in a situation in which two companies using Windows NT merge into a single company. Because of the large number of trusts in a complete trust model, there are additional security concerns about who is able to administer what. The following table outlines the pros and cons of using this domain model.

Advantages and Disadvantages of Using the Complete Trust Model

Advantages

Disadvantages

Scalable to any number of user accounts.

Complex to set up and administer.

Suitable for merging companies or organizations with no central MIS department.

Multiple local groups must be created in each resource domain.

Notes

When you upgrade a Windows NT network based on the complete trust model to a Windows 2000 or Windows .NET Server network, you can maintain the relative independence of each domain by migrating each domain to be the root domain of a domain tree. Each domain tree would have a single domain, namely the root domain. Two-way transitive trusts can then be established between the trees to form a domain forest.

See Also multiple master domain model ,single domain model ,single master domain model

Component Load Balancing (CLB)

A Microsoft clustering technology supported by Microsoft Windows 2000 and Windows .NET Server Server and provided by Microsoft Application Center 2000.

Overview

Component Load Balancing (CLB) is a Microsoft clustering solution that is designed to increase the availability and reliability of distributed applications developed using Microsoft COM+ technologies. A CLB cluster consists of a group of up to 16 nodes (servers) running a distributed COM+ application whose components are distributed across the cluster. A CLB cluster is connected together by a network and is managed by Application Center 2000. When one node in a CLB cluster fails, its workload is distributed to the remaining nodes and the COM+ application keeps running.

Implementation

CLB is usually used in conjunction with other forms of clustering such as Network Load Balancing (NLB) and Microsoft Cluster Services (MCSC) for Microsoft Windows 2000 and Windows .NET Server Enterprise Server edition. This scenario is often used for farms of Web servers running mission-critical Web applications. Typically, NLB is used to handle load balancing of Web servers at the front-end, while CLB load balances COM+ application logic in the middle tier and MCSC provides clustering for back-end database servers. Application Center 2000 is then used to manage the CLB middle tier of the Web farm.

Component Load Balancing (CLB). Using CLB to provide high reliability and availability for distributed COM+ applications.

To distribute the load across the nodes of the CLB cluster, CLB uses round-robin techniques and polling algorithms based on server response time. Because CLB uses frequent polling, be sure to implement your CLB cluster on a fast network (100 megabits per second [Mbps] or faster).

See Also Application Center , clustering

Component Object Model (COM)

An object-based programming architecture developed by Microsoft Corporation that allows applications to be built from binary software components.

Overview

Component Object Model (COM) is both a set of specifications for building application components and a group of underlying services for supporting these components. COM defines a standard method for building components and specifies what these components will look like at the binary level. Because it is a binary standard, COM is language-neutral and COM components can be written using a variety of programming languages including C++, Visual Basic, Java, COBOL, SmallTalk, and other languages. COM also has the following features:

History

Microsoft released an earlier technology, Object Linking and Embedding (OLE), in 1991. OLE enabled functionality from one application to be embedded into another application. For example, a Microsoft Excel spreadsheet could be embedded into a Microsoft Word document and still maintain its spreadsheet functionality. OLE used an underlying technology called Dynamic Data Exchange (DDE) that was complicated in its operation.

In 1995, OLE 2 was released, which replaced DDE with COM as an underlying architecture for OLE. It was soon realized that COM had more uses than embedding one document within another, and COM became the fundamental technology while OLE withdrew to the background. COM has continued to evolve, and its present version is called COM+, which is discussed in a separate article in this chapter.

Implementation

The basic unit of COM is the COM component object, a binary programming object that complies with the COM standards. COM objects can be implemented as either executable (.exe) files or dynamic-link libraries (DLLs) and can function in one of two roles: COM servers (providers) and COM clients (consumers). COM servers and clients interact with each other by using COM interfaces.

A COM interface is a set of methods by which a COM object exposes its functionality to other COM objects. COM interfaces allow COM objects to invoke one another through the methods and properties residing in these interfaces. COM interfaces consist of groups of related functions implemented by the COM class. An interface is basically a table of pointers to functions that are implemented by the object. The table represents the interface, and the functions to which the table points represent the methods of that interface. COM objects can expose multiple interfaces. Each interface has its own unique interface ID (IID), and COM interfaces begin with the letter "I." For example, IUnknown is an important COM interface that must be included in every COM object. IUnknown provides reference counting and interface querying mechanisms and allows navigation to all other interfaces exposed by COM objects.

When COM-based applications are written, COM components are identified by globally unique identifiers (GUIDs), a 16-byte (128-bit) alphanumeric string that is uniquely generated using the current data and time and other information. COM component objects must be registered in order for location transparency to work. You can manually register a COM component object using Regsrv32.exe and other tools.

COM also includes a set of COM services implemented as Win32 library routines (DLLs). These DLLs are used to create new instances of COM components, find and keep track of the location of COM component objects, and perform remote procedure calls (RPCs) for communicating between component objects.

Notes

An alternate component object technology found primarily in the UNIX world is Common Object Request Broker Architecture (CORBA).

For More Information

Learn more about COM at the Microsoft COM site at www.microsoft.com/com

See Also ActiveX, COM+, COM component object, Distributed Component Object Model (DCOM), globally unique identifier (GUID), object linking and embedding (OLE)

CompTIA

Stands for Computing Technology Industry Association, a computer industry trade association formed in 1982.

See Also Computing Technology Industry Association (CompTIA)

computer account

An account in the Active Directory directory service of Microsoft Windows 2000 and Windows .NET Server that signifies that a particular computer is a part of a Windows 2000 or Windows .NET Server domain.

Overview

Windows 2000 and Windows .NET Server domain controllers can store three types of accounts: user accounts, group accounts, and computer accounts. Windows 2000 and Windows .NET Server use computer accounts to determine whether a particular system that a user is employing to attempt to log on to the network is part of the domain. When the NetLogon service running on a client computer connects to the NetLogon service on a domain controller in order to authenticate a user, the NetLogon services challenge each other to determine whether they both have valid computer accounts. This allows a secure communication channel to be established for logon purposes.

In order for a Windows 2000, Windows XP, or Windows .NET Server machine to join a domain, the machine must have a computer account created for it in Active Directory. There are two ways to create this account:

Notes

Machines running Windows 95, Windows 98, and Windows Millennium Edition (Me) can participate in domain authentication, but they do not have computer accounts in Active Directory. This is why the logon box for a Windows 95 or Windows 98 machine has a hard-coded domain name and can log on to only one domain.

If you reinstall Windows 2000 on a machine, you must delete the old computer account and create a new computer account, even if the machine has the same name as before.

See Also account

Computer Browser service

In Microsoft Windows 2000, Windows XP, or Windows .NET Server, a service responsible for enabling the browsing of network resources using Network Neighborhood and Windows Explorer.

Overview

The Computer Browser service simplifies the user task of locating and accessing network resources by eliminating the need for users to remember Universal Naming Convention (UNC) paths or other network syntax and by eliminating the need for all computers on the network to maintain their own list of all available network resources.

The Computer Browser service maintains a distributed series of lists called browse lists that contain information about shared resources available on the network. Different computers on the network have different roles. These computers include the following:

When a client tries to access a shared resource on the network, such as a shared folder on a file server, it first contacts the master browser for a list of backup browsers. Then it contacts a backup browser for a copy of the browse list. When the client has the browse list, it contacts the file server for a list of shares, and then connects to the desired share.

Notes

The Workstation service and Server service must be started for the Computer Browser service to function.

See Also browse list ,browsing

Computer Management

A Microsoft Windows 2000, Windows XP, and Windows .NET Server management console that provides a single integrated desktop tool for managing local and remote machines.

Computer Management. A typical Computer Management console.

Overview

Computer Management combines a number of administrative utilities from Windows NT with additional Windows 2000, Windows XP, and Windows .NET Server tools to provide an easy way of viewing and managing properties of any computer running Windows 2000, Windows XP, or Windows .NET Server on the network. Using Computer Management, an administrator can perform the following actions on local and remote machines:

To use Computer Management for modifying administrative settings, you must be a member of the Administrators group.

See Also Microsoft Management Console (MMC)

computer name

For computers running Microsoft Windows, a name that identifies a computer on the network.

Overview

Computer names can be up to 15 characters in length. In Windows NT, Windows 95, and Windows 98, you specify a computer's name using the Network utility in Control Panel. (In Windows 2000, Windows XP, and Windows .NET Server, use the Network Identification tab of the System utility in Control Panel.) The computer must be restarted if its name is changed. This name is used by services that perform NetBIOS name resolution on the network, such as the Windows Internet Name Service (WINS). Computer names provide a friendly way of accessing network resources without having to remember complex numerical addresses such as IP addresses.

A hidden 16th character is appended to the computer name to form the NetBIOS name for NetBIOS- aware networking services on the machine. Each NetBIOS-aware service has a different NetBIOS name, some of which are based on the name of the computer and others of which are based on the name of the domain in which the computer resides.

Notes

Give friendly names, derived from some common source such as A Midsummer Night's Dream , to groups of computers offering related services. For example, you could call your servers Puck, Oberon, and Titania. This makes it easy to remember that these computers all belong to the same group.

computer-telephony integration (CTI)

A general term describing the integration of computer and telephone technologies.

Overview

By joining computer systems with switched telephone services, users can access advanced functions such as automatic incoming call routing, call display, and power dialing. For example, a computer can use computer-telephony integration (CTI) to issue commands to a telephone switch to control call routing of calls.

CTI applications generally fall into one of two categories:

CTI is made possible on Microsoft Windows platforms by operating system application programming interfaces (APIs) such as Microsoft Corporation's Telephony Application Programming Interface (TAPI). The range of products and technologies that support CTI continues to evolve. Cross-platform, vendor-neutral standards have not yet been established.

Computing Technology Industry Association (CompTIA)

A computer industry trade association formed in 1982.

Overview

The Computing Technology Industry Association (CompTIA) currently has more than 7500 members. CompTIA membership includes resellers, value-added resellers (VARs), distributors, manufacturers, and training companies in the United States and Canada. The goals of CompTIA are to foster professional competence and business ethics among its members and throughout the computer industry. CompTIA provides its members with educational opportunities, a professional network, and a forum for the development of ethical, professional, and business standards in the computing industry. A number of committees meet to consider issues such as software licensing and electronic warranty forms.

For More Information

Visit the CompTIA online at www.comptia.org

COMTI

Stands for COM Transaction Integrator, a component of Microsoft SNA Server version 4 that provides client applications with access to two popular mainframe transaction processing (TP) environments, Customer Information Control System (CICS) and Information Management System (IMS).

See Also COM Transaction Integrator (COMTI)

COM Transaction Integrator (COMTI)

A component of Microsoft SNA Server version 4 that provides client applications with access to two popular mainframe transaction processing (TP) environments, Customer Information Control System (CICS) and Information Management System (IMS).

Overview

COM Transaction Integrator (COMTI) works in conjunction with Microsoft Transaction Server (MTS), making CICS and IMS programs appear as MTS components that can be used with other MTS components to build distributed applications. COMTI includes both a Microsoft Windows NT Server run-time environment and a development tool called Component Builder, which can import mainframe COBOL code and automatically generate an object compatible with MTS. This lets developers program in the visual, object- oriented environments they are accustomed to, allowing them access to host transactions without needing to learn the intricacies of Systems Network Architecture (SNA).

See Also SNA Server ,Systems Network Architecture (SNA)

concurrency

A term referring to the simultaneous access to a network resource by more than one client.

Overview

Concurrency is an important issue in the licensing of a server operating system or application. For example, the Per Server licensing mode for Microsoft Windows NT Server is based on concurrency. If you purchase 10 client access licenses (CALs) for your Windows NT Server, a maximum of 10 concurrent connections can legally be formed with that server for accessing network resources.

Notes

Some products, such as Microsoft Outlook 98, do not support concurrent access. In other words, you cannot install a central copy of Outlook 98 on a server and have thin clients run this program from the centralized location. Instead, you must install one copy of Outlook 98 on each client that needs to run it.

connected network (CN)

In Microsoft Message Queue (MSMQ) Server terminology, a name for a collection of computers in which any two computers can directly communicate.

Overview

Computers in the same connected network must be running the same network protocol. A connected network (CN) is essentially a label describing how MSMQ servers are related in an enterprise. CNs are logical groupings of computers that can communicate directly using MSMQ messages. When you install an MSMQ server, you specify a connected network for each network address on the server.

When you specify connected networks for your MSMQ enterprise, it is a good idea to use meaningful labels so that administrators can easily select a connected network from a list when they need to override the default connected network settings.

connection

A link between two computers for the purpose of exchanging information.

Overview

An example would be a Microsoft Windows NT Workstation, Windows 95, or Windows 98 client computer accessing a shared folder or printer on a Windows 2000 server. The term connection is also used to describe the establishment of communication over a WAN link, as in using a dial-up connection over a modem.

When a client computer tries to connect to a server, the success or failure of the attempt can depend upon whether

See Also client access license (CAL) ,license

connectionless protocol

Any transport layer protocol that relies on broadcast packets instead of directed packets.

Overview

Connectionless protocols can only offer "best-effort" delivery and cannot guarantee that packets will arrive in the correct order or even at all. Connectionless protocols cannot guarantee delivery of packets. Instead, reliability of packets is handled by the application itself or some higher layer of the protocol stack.

An example of a connectionless protocol is the User Datagram Protocol (UDP), which is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. UDP provides connectionless services for delivering small packets of information commonly called datagrams. Another connectionless transport layer protocol is the Appletalk Transaction Protocol (ATP), part of the AppleTalk suite of protocols.

Notes

The term connectionless is also used to describe any delivery mechanism where complete addressing information (the address of the source and the address of the destination) is included in every packet. Packets are then placed on the network and are delivered to their destination independently, sometimes taking different routes and arriving in a mixed-up order that needs to be sorted out using packet numbers.

In this more general context, we can also examine protocols at other layers such as the network layer and data link layer. Most local area network (LAN) protocols at these layers are connectionless. For example, at the network layer we have IP, Internetwork Packet Exchange (IPX), Datagram Delivery Protocol (DDP), which is part of the legacy AppleTalk protocol suite, and DECnet Routing Protocol (DRP), which is part of the legacy DECnet protocol suite, all connectionless. At the datalink layer we have Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI), and others, again all connectionless. An example of a data-link layer protocol that is connection-oriented instead of connectionless is Asynchronous Transfer Mode (ATM).

See Also connection-oriented protocol ,protocol

Connection Manager Administration Kit (CMAK)

A wizard-based tool for creating custom connectivity solutions, and a component of Internet Connection Services for Microsoft Remote Access Service (RAS).

Overview

The Connection Manager Administration Kit (CMAK) is used to customize the Microsoft Connection Manager (CM) client component. Internet service providers (ISPs) can use this tool to customize dial-up installation packages for their customers. Customization features include

connection-oriented protocol

Any transport layer protocol that establishes a connection first in order to reliably send packets over the network.

Overview

Connection-oriented protocols guarantee delivery of packets by making use of acknowledgments and retransmission of data. Connection-oriented protocols are used primarily for reliable delivery of large packets of data, as opposed to the unreliable connectionless protocols that are used to deliver small datagrams.

An example of a connection-oriented protocol is TCP, which is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. The TCP protocol uses a TCP three-way handshake to establish a connection between two hosts on a network. During session establishment, the hosts negotiate the TCP window size, segment size, and other information needed to ensure reliable and efficient communication. A TCP connection is terminated using a similar handshake procedure. Another example of a connection-oriented transport layer protocol is Sequenced Packet Exchange (SPX), part of the NetWare suite of protocols. The legacy network service provider (NSP) protocol of the DECnet suite of protocols is also a connection-oriented transport layer protocol.

Notes

At lower Open Systems Interconnection (OSI) levels such as the network layer and data link layer, most local area network (LAN) protocols are connectionless instead of connection-oriented. Asynchronous Transfer Mode (ATM) is an exception and is connection- oriented. In ATM a virtual circuit (data pathway) is first established prior to sending any data. Instead of addressing data packets (actually cells) with source and destination addresses as in a connectionless protocol, ATM assigns the circuit number to the cells to ensure they reach their destination. Because circuit numbers are much smaller than network addresses, connectionless protocols such as ATM have less overhead than connection-oriented protocols such as IP or Ethernet.

See Also connectionless protocol ,protocol

connection pooling

A technique for optimizing Active Server Pages (ASP) applications running on Microsoft Internet Information Server (IIS) version 4 and Internet Information Services (IIS).

Overview

Connection pooling allows more efficient implementation when connecting ASP front-end applications to a back-end database. Connection pooling involves the pooling of open database connectivity (ODBC) connections to reduce the frequency at which ODBC connections need to be opened and closed on heavily accessed servers. Connection pooling improves ASP performance for ODBC-enabled Web applications and provides a graceful way to manage connection timeouts.

To use ODBC connection pooling on IIS, perform the following steps:

  1. Configure the database driver using ODBC in Control Panel.

  2. Enable connection pooling in the Microsoft Windows NT registry.

  3. Open individual connections in your Microsoft ActiveX Data Objects (ADO) code right before data access is needed for an ASP page and release connections as soon as the data has been accessed.

When connection pooling is enabled, the ODBC driver will check the connection pool for idle connections it can reuse before creating a new connection in response to an ODBC request. When connections are released, they are returned to the connection pool instead of being closed.

Notes

You can control the amount of time an idle connection remains in the pool using the CPTimeout registry setting, which has a default setting of 60 seconds.

See Also Active Server Pages (ASP)

connectivity server

A computer running Microsoft Exchange Server that is dedicated for routing messages to other sites and foreign mail systems using Exchange connectors.

Overview

Large companies often require servers that are dedicated to message routing because of the high volume of message traffic they experience. In a typical high- volume site configuration, one server might be optimized as a home server for users' mailboxes, another server for dedicated public-folder replica hosting, and a third for providing dedicated messaging connectivity with other sites and foreign messaging systems. A connectivity server can have one or more connectors installed on it to provide connectivity with Exchange sites, Simple Mail Transfer Protocol (SMTP) hosts, X.400 messaging systems, or Microsoft Mail postoffices. The more connectors you have on a server, the greater its hardware requirements become.

Notes

On Exchange 5.5 systems, run the Performance Optimizer wizard after you have installed your connectors on the Exchange server. This will allow your server to take maximum advantage of its particular hardware configuration.

connector (device)

A device that terminates a segment of cabling or provides a point of entry for networking devices such as computers, hubs, and routers.

Overview

Connectors can be distinguished according to their physical appearance and mating properties, such as jacks and plugs (male connectors) or sockets and ports (female connectors). They can also be distinguished by their different pinning configurations, such as DB9 and DB15 connectors, which have 9 and 15 pins, respectively. In addition, connectors are distinguished by the kind of electrical interfaces they support. Examples of different types of connectors include

A single connector may be used for a variety of purposes and different interfaces. For example, the DB-60 connector supports any of the following interfaces: V.35, X.21, EIA-530, EIA/TIA-232, and EIA/TIA-449. So you cannot always tell from the appearance of a connector what its function is-it depends on the interface it implements.

There are literally dozens of types of connectors used in networking, and the networking professional needs to be familiar with many of them. The illustration shows some of the common connector types used in different aspects of networking and telecommunications. Many of these connectors are discussed in separate articles elsewhere in this book.

Connector for Lotus cc:Mail

A component of Microsoft Exchange Server 5.5 that enables message transfer and directory synchronization between Exchange Server and Lotus cc:Mail systems.

Overview

Lotus cc:Mail uses a shared-file messaging architecture similar to that of Microsoft Mail. The Connector for Lotus cc:Mail is implemented as a Microsoft Windows NT service on Exchange Server and supports the following functions:

Only one Connector for Lotus cc:Mail can be installed on a given computer running Exchange Server, and that connector can connect to only one cc:Mail postoffice. However, multiple computers running Exchange Server can each have a cc:Mail connector installed in order to connect to multiple postoffices throughout a cc:Mail messaging system. The Lotus cc:Mail programs export.exe and import.exe must be installed on the computer running Exchange Server for connectivity to be established.

The Connector for Lotus cc:Mail can be used to provide connectivity with database versions 6 or 8 cc:Mail postoffices.

Connector for Lotus Notes

A component of Microsoft Exchange Server 5.5 that enables message transfers and directory synchronization between Exchange Server and Lotus Notes systems.

Overview

The Connector for Lotus Notes allows either single or multiple Lotus Notes servers to be accessed from a single machine running Exchange Server. The Connector for Lotus Notes is implemented as a Microsoft Windows NT service on Exchange Server and supports

The Connector for Lotus Notes also converts message content to Rich Text Format (RTF) and converts Object Linking and Embedding (OLE) objects on Exchange Server to Lotus Doclinks objects.

The Connector for Lotus Notes supports Lotus Notes 3.x and Lotus Notes/Domino 4.x .

Notes

Be sure to install the Lotus Notes client on the computer running Exchange Server prior to attempting to install the Connector for Lotus Notes on the machine. The connector needs this client to log on to the Lotus Notes mail server. If you have trouble establishing connectivity, check that the connector has a valid Lotus Notes ID and that this ID has the appropriate permissions needed to access the databases on the machine running Lotus Notes.

connector (Microsoft Exchange)

A component of Microsoft Exchange Server 5.5 used to connect Exchange sites or to connect an Exchange organization to foreign mail systems.

Overview

Connectors are components of Exchange that can be used to route messages over a messaging system. Connectors are implemented on Exchange as Microsoft Windows NT services and can be stopped and started using the Services utility in Control Panel.

Various types of connectors can be installed on Exchange, including the following:

See Also Connector for Lotus cc:Mail ,Connector for Lotus Notes

Consumer DSL (CDSL)

A broadband transmission technology based on Digital Subscriber Line (DSL) technologies.

Overview

Consumer DSL (CDSL) was developed by Rockwell and is a slower technology than the more common DSL variant called Asymmetric Digital Subscriber Line (ADSL). CDSL provides data rates of about 1 megabit per second (Mbps) downstream (about 128 kilobits per second [Kbps] upstream) to the customer premises over standard Plain Old Telephone Service (POTS) local loop wiring.

However, CDSL has the advantage of not requiring installation of a splitter at the customer premises. CDSL can operate only at distances of up to 18,000 feet (5500 meters) from the telco's central office (CO).

See Also Digital Subscriber Line (DSL)

container (Active Directory)

In Microsoft Windows 2000 and Windows .NET Server, an object in Active Directory directory service that can contain other objects.

Overview

Examples of containers include organizational units (OUs), domains, and local networks. Domains are the core containers for organizing the structure of Active Directory. The other kinds of objects in Active Directory are leaf objects, which cannot contain other objects.

Objects created in a container inherit the discretionary access control list (DACL) of the container itself. In other words, a child object obtains its permissions from its parent object by inheritance.

Notes

Groups are not containers; they are security principals.

See Also Active Directory

container (Microsoft Management Console)

In Microsoft Management Console (MMC), any node in a console tree to which other nodes can be added.

Overview

The usual icon for a container in MMC is the folder icon. The highest-level container in a console is the console root node. Beneath this node in the hierarchy are the top-level nodes for individual snap-ins that have been installed. Administrators who are creating new MMC consoles can create additional containers (folders) for organizing their console trees as desired.

See Also Microsoft Management Console (MMC)

container (NTFS)

In NTFS file system (NTFS), a file system object (such as a directory) that can contain other objects (such as files).

Overview

Objects created in a container inherit the access control list (ACL) of the container itself. In other words, a child object obtains its permissions from its parent object by inheritance. For example, if a directory on an NTFS volume has read permission assigned to the Everyone group, any new file that you create or save in the directory will inherit the same permission. Using containers therefore simplifies the assignment of permissions to objects in the file system.

See Also NTFS file system (NTFS)

Content Advisor

A feature of Microsoft Internet Explorer that allows you to control user access to Web sites based on the content ratings of the sites.

Overview

The Internet provides individuals with access to a wide variety of information, but some of this information might be unsuitable for certain viewers. For example, parents are often concerned about their children being exposed to violent or sexually explicit material on the Internet.

Content Advisor lets you control the kind of Internet content that can be accessed using Internet Explorer. This is a useful feature in corporate networks that have high-speed connectivity to the Internet because it can be used to discourage improper use of Web browsers on employee machines, thus helping to implement a company's acceptable use policy for the Internet. With Content Advisor, you can specify ratings settings to indicate acceptable levels of content to view with regard to sex, nudity, violence, and offensive language, and you can password-protect these settings.

Notes

Content Advisor functions properly only with Web sites that are rated.

Content Analyzer

A tool included with Microsoft Site Server and Microsoft Site Server Express that lets Web server administrators perform content analysis and link management of Web sites.

Overview

Content Analyzer can visually display the structure and integrity of a site in the form of a diagram called a Web map. Web maps allow administrators to visually examine a site's structure and quickly identify problems, such as loops and broken links. Web maps display various Web content items using different icons and can use a variety of colors to convey different kinds of information. You can also use Content Analyzer to search Web maps for various kinds of information using predefined Quick Searches. When you find an item of interest on a Web map, you can open your Web page editing tool directly from the Web map. You can also export Web map information into a database or spreadsheet file for further analysis.

Content Analyzer can also generate predefined site reports you can use to identify broken links and analyze the structure of Web sites. These site reports can be generated in Hypertext Markup Language (HTML) format for easy reading and evaluation and can identify changes to the content of a site, broken links, and other information.

content caching

A feature of a proxy server such as Microsoft Proxy Server.

Overview

Content caching allows a proxy server to cache the results of a client request. The next time a client requests the same content, it is retrieved from the cache to improve performance. Content remains in the cache for a predetermined period of time, or until the cache becomes full and old content is moved to allow new content to be cached.

Microsoft Proxy Server makes use of distributed caching, which lets content caching take place closer to users and allows caching activity to be load-balanced across several Proxy Servers for scalability and fault tolerance. For example, within corporate intranets, caching can be moved toward the branch office and workgroup levels of the organization. For Internet service providers (ISPs), caching can be moved toward regional points of presence (POPs). Distributed caching is particularly effective for solving network bandwidth problems associated with Internet push technologies.

Microsoft Proxy Server's distributed caching can be implemented in two ways:

See Also proxy server

content delivery network (CDN)

A method for efficiently pushing out content over the Internet to users.

Overview

The idea of content delivery networks originated as the next evolutionary step up from caching of Web content on the Internet. Like caching, the idea of CDN is to deliver content to users over the Internet as efficiently and quickly as possible. CDN takes caching a step further by actively pushing content out rather than passively caching frequently-requested content. A company that builds and operates a CDN is sometimes called a Content Delivery Provider (CDP).

Akamai Technologies developed the first CDN solution to efficiently deliver streaming media content over the Internet. Akamai accomplished this through alliances with regional Internet service providers (ISPs) for hosting their caching servers around the globe and setting up their own advanced Web hosting centers. Akamai then used forward-proxy caching servers at their hosting centers to push content out to caching servers at the edges of the Internet, allowing users around the globe to access streaming media presentations from nearby caching servers instead of from centralized streaming media servers many network hops away. The result was a system with better performance than existing implementations of streaming media.

CDNs are now used not just for streaming media but for supporting a wide variety of different kinds of content delivered over the Internet including static and dynamic Web content, video-on-demand, and other services.

Implementation

There are many ways to implement a CDN, and the technology continues to evolve rapidly. A simple example would be a CDP that hosts content for a company on Web and media servers in its data center and then uses a private network to push this content out to caching servers colocated at points of presence (POPs) of regional ISPs located near the company's customers. The private network could be a satellite link, leased lines, private backbone networks (such as those owned by AT&T Wireless), or a leased portion of Internet backbone bandwidth (usually an expensive solution). Private peering arrangements between ISPs and the CDP enable the CDN to work. Personalization servers keep track of user personalization data for customers in different regions.

The resulting CDN can be envisioned as a "content island" within the ocean representing the Internet-only subscribers on this island can make use of the CDN to improve access to hosted content. With many CDNs in existence around the globe and run by different CDPs, interoperability between them becomes an issue-what if a subscriber of one CDN wants to access content in a different CDN? To solve this problem, the Content Bridge is a vendor consortium of CDNs and CDPs whose aim is to move toward developing new protocols to enable interoperability between different CDNs so that a subscriber of one CDN can access content from the network of a different CDN. The Internet Engineering Task Force (IETF) is also working on a number of draft protocols to support interoperability between different CDNs.

Content delivery network (CDN). A simple example of how a CDN works.

Marketplace

Since Akamai blazed the path, a plethora of new CDNs have arisen and are vying for market dominance. These include

Despite the proliferation of CDN vendors and solution providers, Akamai and Inktomi, two early comers to the market, have established their platforms as cornerstone solutions for many large ISPs and enterprise customers. Akamai has more than 4000 caching servers distributed at POPs in over 50 countries. Other prominent players include new companies such as Digital Island. Existing networking companies are also releasing CDN solutions to the marketplace, though, including Cisco and Lucent Technologies.

A number of vendors are offering turnkey CDN solutions that can be easily implemented to improve content hosting performance for corporate intranets, ISPs, carriers, and others who need it. A leading vendor of CDN-in-a-box solutions is EdgeStream.

See Also caching

Content Delivery Provider (CDP)

A company that builds and operates a content delivery network (CDN).

See Also content delivery network (CDN)

content filter

A component of Microsoft Indexing service that can read a specific document format and turn it into a stream of text characters.

Overview

Content filters are an essential part of the indexing process on Indexing service because they determine which types of documents can be read and indexed. Indexing service includes content filters for popular file formats such as

In addition, many third-party companies have produced content filters for their own document formats, allowing these documents to be indexed by Indexing service when their content filters have been installed. Content filters also handle the presence of embedded objects in documents and recognize when a language shift occurs in a multilingual document.

contention

A condition that occurs when two or more stations on a network try to access the network medium simultaneously. In other words, the stations are contending for control of the medium.

Overview

There are different ways of resolving contention issues on a network. One way is to use a single station as the master or primary station that controls all communication on the network. Other devices on the network function as slave, or secondary, stations. The entire system is known as a master-slave system. The master station normally functions in transmit mode, while the slave stations operate in receive mode. The master station tells individual slave stations when they should switch to transmit mode in order to transmit information over the network. This kind of scenario is used in networks based on IBM's Systems Network Architecture (SNA).

In Ethernet networks, the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) method is used to resolve contention on the network by allowing collisions to occur, and then resolving them successfully.

See Also Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

content rating

A mechanism for preventing users of Microsoft Internet Explorer from viewing Web sites that contain objectionable language, violence, nudity, or sexually explicit content.

Overview

These ratings are configured on the Web server on a site-by-site basis. Ratings for each category have been established at four levels of acceptable use. The Webmaster who creates the site can then include information about the levels of objectionable language, violence, nudity, or sexually explicit content present on their site. Content ratings are defined by the Recreational Software Advisory Council (RSAC). The user can configure her browser to a specified accessibility level for each type of content by using the Content Advisor feature of Internet Explorer.

For More Information

RSAC can be found at www.rsac.org

control message

A command sent from one Usenet host to another.

Overview

Control messages are defined in the Network News Transfer Protocol (NNTP) specifications. Control messages can be issued by Usenet hosts to perform actions such as

Control messages are simple text commands. You can troubleshoot a Usenet host by using telnet to connect to port 119 and manually typing various control messages and examining their results.

See Also Network News Transfer Protocol (NNTP) ,Usenet

Control Panel

A Microsoft Windows feature consisting of a number of utilities for configuring hardware devices and operating system services.

Overview

The following table shows some of the more common Control Panel utilities in Windows 95, Windows 98, Windows NT, Windows 2000, Windows XP, and Windows .NET Server and briefly describes their function. Note that some utilities are named differently in the various Windows versions, such as 32-bit ODBC for Windows NT and ODBC (32 bit) for Windows 95 or 98; these utilities are listed separately here. Note also that some Control Panel utilities are present only when additional Windows components have been installed. For example, the GSNW utility is present only when Gateway Services for NetWare has been installed. Finally, installing additional third-party software can add new utilities to Control Panel associated with that software.

Control Panel. Windows 2000 Control Panel.

Common Control Panel Utilities

Control Panel Utility

Function

Windows 95 and 98

Windows NT

Windows 2000

Windows XP and .NET Server

32-bit ODBC

Database connectivity

x

x

x

Accessibility Options

Help for visually or motor-impaired individuals

x

x

x

Add New Hardware

Hardware installation wizard

x

Add/Remove Hardware

Hardware installation wizard

x

x

Add/Remove Programs

Installs new software or Windows components

x

x

x

x

Administrative Tools

Shortcut to Administrative Tools program group

x

x

Console

Command prompt window

x

Date/Time

Date, time, time zone

x

x

x

x

Desktop Themes

Configures appearance of desktop

x

Devices

Startup profiles for hardware devices

x

Dial-Up Monitor

Monitors RAS connections

x

Display

Screen and desktop settings

x

x

x

x

Folder Options

Enables Active Desktop and determines how folders are displayed

x

x

Fonts

Installs new fonts

x

x

x

x

Game Controllers

Configures joysticks

x

x

x

GSNW

Gateway Services for NetWare

x

x

x

Internet

Internet Explorer options

x

x

Internet Options

Internet Explorer options

x

x

Keyboard

Style and response rate

x

x

x

x

Licensing

Changes licensing mode and configures replication

x

x

x

MacFile

Services for Macintosh

x

Mail

Messaging profiles

x

x

x

x

Message Queuing

Configuration options for Microsoft Message Queue Server

x

x

Modems

Modem settings

x

x

Mouse

Mouse settings

x

x

x

x

Multimedia

Audio/video settings

x

x

Network

Networking clients, services, protocols, and adapters

x

x

Network and Dial-up Connections

Creates and configures network connections

x

x

ODBC (32-bit)

Database connectivity

x

Passwords

Configures passwords, enables remote administration, and enables user profiles

x

PC Card

Settings for Personal Computer Memory Card International Association (PCMCIA) cards

x

x

x

x

Phone and Modem

Modem and TAPI location settings

x

x

Ports

COM port settings

x

Power Management

Advanced power management settings

x

x

x

Power Options

Advanced power management settings

x

x

Printers

Adds printer wizard and manages printers

x

x

x

x

Regional Options

Currency and other settings for countries and regions

x

x

Regional Settings

Currency and other settings for countries and regions

x

x

Scanners and Cameras

Configures these devices

x

x

Scheduled Tasks

Schedule system management tasks

x

x

SCSI Adapters

SCSI device settings

x

Server

Server role

x

Services

Starting and stopping services

x

Sounds

System sounds

x

x

Sounds and Multimedia

Audio/visual hardware/software and system sounds

x

x

System

Boot, file system, profiles, devices, environment, network identification, and other functions (depending on the version of Windows)

x

x

x

x

Tape Devices

Tape drive settings

x

Telephony

TAPI location settings

x

x

UPS

Uninterruptible Power Supply settings

x

Users

User profiles

x

control set

Refers to a set of registry keys in Microsoft Windows 2000, Windows XP, and Windows .NET Server that contain configuration information used for system startup.

Overview

Control sets define certain aspects of the Windows 2000, Windows XP, and Windows .NET Server boot process to allow Windows 2000, Windows XP, and Windows .NET Server to boot up successfully. Up to four control set subkeys are located under the HKEY_LOCAL_MACHINE\SYSTEM registry key, including the following:

The Select registry key found under HKEY_LOCAL_ MACHINES\SYSTEM identifies which of the control set keys corresponds to the current, default, failed, and Last Known Good configurations. If the current control set cannot start the system, you can press the Spacebar when indicated during the boot process to select the last known good configuration, which is the last control set that worked for sure.

See Also registry

convergence

The process of updating routing tables after a change in the routing topology of an internetwork.

Overview

When a change occurs in the routing infrastructure of an internetwork, information concerning the change needs to be replicated to all routers that need to know about it. The process by which all routers gradually become aware of the change that occurred is called convergence.

Examples of occurrences that affect the routing infrastructure of an internetwork include adding a new router to the network, having an existing router fail on the network, and adding a new route to the routing table of a router on the network. When any of these situations arise, the routing protocol used to provide communications between the routers on your network is used to communicate these changes to all the routers that need to be aware of them. It typically takes time (from minutes to hours) for such changes to propagate completely through the internetwork's routing infrastructure, and as routers become updated with the new routing information, the network is said to "converge" toward its final state.

Convergence is important-if it does not occur fully, some routes may be unavailable on the network, making some parts of the network inaccessible. Furthermore, some packets may end up disappearing into "black holes" instead of arriving at their destination.

Notes

A more popular usage of the term convergence is to describe the merging of voice, data, and video services for transmission over a single network.

See Also black hole ,internetwork ,routing

cookie

A small text file that the Web server saves the Web browser during a Hypertext Transfer Protocol (HTTP) session.

Overview

Cookies were originally intended to enable session state information to be maintained for Web applications across multiple HTTP requests. However, most commercial Web sites also use cookies to record information about the client's usage patterns, including the date and time the client visited the site, which pages were accessed, and Web browser preferences. Other uses for cookies include providing custom or personalized pages for users visiting Web sites, targeting advertising to users according to the pattern of their previous visits to a site, and enabling online shopping carts to function.

Cookies use the storage system of the client for saving this information instead of storing it on the server. Because the vast number of clients might visit the site only once, it would be inefficient to dedicate a large portion of server storage to tracking anonymous clients who might never return. Furthermore, client preferences (such as IP address) might change between sessions, especially for dial-up clients, so servers would have no way of recognizing clients if cookie information were saved on the server. Cookies therefore provide a way for the server to recognize that the client previously visited the site and record what the client did during previous visits, allowing the server to customize the HTTP session to meet the needs of the client (or the needs of the site's advertisers!).

Cookies are harmless text files and cannot be used to transmit a virus to the client. Cookies are simply passive holders of information; they cannot be used by hackers and other unauthorized users to "get" information off your computer such as your e-mail address. Nevertheless, most Web browsers, such as Microsoft Internet Explorer, have an optional setting that allows users to reject cookies. However, rejecting cookies can result in poorer browsing experiences on sites that are cookie-dependent. You can also delete any cookies on a computer running Microsoft Windows by deleting the contents of the Cookies subdirectory within the user profile directory on your hard drive (do not delete the directory itself, however!)

Notes

Web applications written using Microsoft Active Server Pages (ASP) technology can use cookies for maintaining session state information.

Shareware sites offer a variety of third-party browser plug-ins for managing or disabling cookies.

See Also Hypertext Transfer Protocol (HTTP) ,Web browser ,Web server

copper cabling

One of the two basic types of physical cabling media (the other being glass, or fiber-optic, cabling).

Overview

Copper cabling is cheap and flexible, but it is susceptible to electromagnetic interference (EMI), has limited range because of attenuation, and generates electromagnetic radiation that can be intercepted by nearby equipment.

The types of copper cabling commonly used in networking include

For more information on these types of copper cabling, refer to their individual entries in this book.

Implementation

UTP cabling of Category 5 (Cat5) grade is the most commonly used copper cabling in networking environments today. Cat5 cabling comes in either solid core or stranded cabling. Solid core cabling is stiffer, but it has better conductivity and less attenuation, and it is simpler to terminate than stranded cabling. Stranded cabling is more flexible and easier to work with than solid cabling, and it is more resistant to breaking or fracturing. Use solid core UTP cabling for fixed horizontal cable runs, cross-connects, and backbone cabling; use stranded UTP cabling for locations where equipment is frequently moved, for short cable runs between computers and wall plates, or as patch cables in the wiring closet.

See Also cabling ,coaxial cabling fiber-optic cabling, unshielded twisted-pair (UTP) cabling

Copper Distributed Data Interface (CDDI)

A form of Fiber Distributed Data Interface (FDDI) deployed over copper cabling instead of fiber.

Overview

Copper Distributed Data Interface (CDDI) can send data over unshielded twisted-pair (UTP) cabling at 100 megabits per second (Mbps), but cable lengths are limited to about 330 feet (100 meters). The architecture and operation are similar to FDDI, but CDDI is not as commonly implemented as FDDI (and because FDDI is usually considered a legacy networking architecture now, CDDI is also likely to fade away quickly.

If cost is an issue, CDDI offers an alternative to FDDI. CDDI still provides a 100-Mbps network with redundancy, but at reduced cost because copper cabling is cheaper than fiber-optic cabling. Note that CDDI does not provide the security that FDDI does: copper cabling can be tapped, but fiber-optic cabling cannot.

See Also Fiber Distributed Data Interface (FDDI)

copy backup

A backup type in which all the selected files and folders are backed up, but the archive attribute is not marked for each file and folder.

Overview

Copy backups (or simply copies) do not interrupt the normal backup schedule because they do not change the state of the archive bit on files being backed up. Copy backups are typically used to produce additional copies of backup tapes. Copy backups might be used for

See Also backup ,backup type

copying files

Making a replica of files.

Overview

On Microsoft Windows platforms, files can be copied using a graphical user interface (GUI) tool such as Windows Explorer or from the command prompt using the copy command. Some inheritance issues are associated with copying files on Windows NT, Windows 2000, Windows XP, and Windows .NET Server platforms that use the NTFS file system (NTFS). Specifically, copying a file within or between different NTFS volumes causes the file to inherit the permissions of the folder into which it is copied. For example, if a file on the NTFS drive C has read permission for everyone and it is copied to a directory on the NTFS drive D, which has change permission for everyone, the copy of the file inherits the change permission from the directory it is moved to.

See Also moving files

CORBA

Stands for Common Object Request Broker Architecture, a component architecture that specifies technologies for creating, distributing, and managing component programming objects over a network.

See Also Common Object Request Broker Architecture (CORBA)

Core-Based Trees (CBT)

A multicast routing protocol.

Overview

Internet Protocol (IP) multicasting relies on the spanning tree algorithm to ensure delivery of information to intended recipients. Spanning-tree technologies can be implemented in two basic ways:

Core-Based Trees (CBT) is one of two sparse-mode protocols commonly used, the other being Protocol Independent Multicast Sparse Mode (PIM-SM).

Architecture

CBT works by having a single core router create a single multicast routing tree, regardless of the multicast transmission's source. Then, when a multicast client wants to register to receive a multicast transmission, the client contacts the nearest upstream multicast router by sending an Internet Group Membership Protocol (IGMP) packet to the router. If the member router is already receiving the multicast transmission, it registers the client and forwards the transmission to the client. If the router is not receiving the transmission, it contacts the next router upstream, and this continues until, if necessary, the core router is reached. The core router then adds the member routers to the multicast group and forwards the transmission to the member router, which then passes it to the client.

See Also dense mode ,multicasting ,Protocol Independent Multicast-Sparse Mode (PIM-SM) ,routing ,sparse mode

counter

An aspect of an object in Performance for which usage statistics can be collected.

Overview

Performance is a Microsoft Windows 2000, Windows XP, and Windows .NET Server administrative console for monitoring system resources. It can be used to collect status information about various objects. For example, if the object Processor is being studied, the Performance Monitor collects information on all counters that belong to this object. This includes counters such as

If the machine is a multiprocessor system, each instance of each counter can be monitored. Performance Monitor counters are usually one of two types:

country code

A two-letter code identifying top-level domains for countries and regions in the Domain Name System (DNS).

Overview

Country codes are a way of geographically identifying a domain name as belonging to a particular country or region. They are an alternative to the more commonly used organizational codes such as .com, .org, and .net. This table lists the various country codes in the DNS system.

Country Codes

Code

Country/Region

Code

Country/Region

ad

Andorra

ca

Canada

ae

United Arab Emirates

cc

Cocos (Keeling Islands)

af

Afghanistan

cf

Central African Republic

ag

Antigua and Barbuda

cg

Congo (Congo Republic)

ai

Anguilla

ch

Switzerland

al

Albania

ci

Cote d'Ivoire

am

Armenia

ck

Cook Islands

an

Netherlands Antilles

cl

Chile

ao

Angola

cm

Cameroon

aq

Antarctica

cn

China

ar

Argentina

co

Colombia

as

American Samoa

cr

Costa Rica

at

Austria

cu

Cuba

au

Australia

cv

Cape Verde

aw

Aruba

cx

Christmas Island

az

Azerbaijan

cy

Cyprus

ba

Bosnia and Herzegovina

cz

Czech Republic

bb

Barbados

de

Germany

bd

Bangladesh

dj

Djibouti

be

Belgium

dk

Denmark

bf

Burkina Faso

dm

Dominica

bg

Bulgaria

do

Dominican Republic

bh

Bahrain

dz

Algeria

bi

Burundi

ec

Ecuador

bj

Benin

ee

Estonia

bm

Bermuda

eg

Egypt

bn

Brunei Darussalam

eh

Western Sahara

bo

Bolivia

er

Eritrea

br

Brazil

es

Spain

bs

Bahamas

et

Ethiopia

bt

Bhutan

fi

Finland

bv

Bouvet Island

fj

Fiji Islands

bw

Botswana

fk

Falkland Islands (Islas Malvinas)

by

Belarus

fm

Micronesia

bz

Belize

fo

Faroe Islands

fr

France

jp

Japan

fx

France (Metropolitan)

ke

Kenya

ga

Gabon

kg

Kyrgyzstan

gd

Grenada

kh

Cambodia

ge

Georgia

ki

Kiribati

gf

French Guiana

km

Comoros

gh

Ghana

kn

Saint Kitts and Nevis

gi

Gibraltar

kp

Korea (North)

gl

Greenland

kr

Korea (South)

gm

Gambia

kw

Kuwait

gn

Guinea

ky

Cayman Islands

gp

Guadeloupe

kz

Kazakhstan

gq

Equatorial Guinea

la

Laos

gr

Greece

lb

Lebanon

gs

South Georgia and South Sandwich Islands

lc

Saint Lucia

gt

Guatemala

li

Liechtenstein

gu

Guam

lk

Sri Lanka

gw

Guinea-Bissau

lr

Liberia

gy

Guyana

ls

Lesotho

hk

Hong Kong SAR

lt

Lithuania

hm

Heard and McDonald Islands

lu

Luxembourg

hn

Honduras

lv

Latvia

hr

Croatia (Hrvatska)

ly

Libya

ht

Haiti

ma

Morocco

hu

Hungary

mc

Monaco

id

Indonesia

md

Moldova

ie

Ireland

mg

Madagascar

il

Israel

mh

Marshall Islands

in

India

mk

Macedonia, Former Yugoslav Republic of

io

British Indian Ocean Territory

ml

Mali

iq

Iraq

mm

Myanmar

ir

Iran

mn

Mongolia

is

Iceland

mo

Macau SAR

it

Italy

mp

Northern Mariana Islands

jm

Jamaica

mq

Martinique

jo

Jordan

mr

Mauritania

ms

Montserrat

ru

Russian Federation

mt

Malta

rw

Rwanda

mu

Mauritius

sa

Saudi Arabia

mv

Maldives

sb

Solomon Islands

mw

Malawi

sc

Seychelles

mx

Mexico

sd

Sudan

my

Malaysia

se

Sweden

mz

Mozambique

sg

Singapore

na

Namibia

sh

St. Helena

nc

New Caledonia

si

Slovenia

ne

Niger

sj

Svalbard and Jan Mayen Islands

nf

Norfolk Island

sk

Slovak Republic

ng

Nigeria

sl

Sierra Leone

ni

Nicaragua

sm

San Marino

nl

Netherlands

sn

Senegal

no

Norway

so

Somalia

np

Nepal

sr

Suriname

nr

Nauru

st

Sao Tome and Principe

nu

Niue

sv

El Salvador

nz

New Zealand

sy

Syria

om

Oman

sz

Swaziland

pa

Panama

tc

Turks and Caicos Islands

pe

Peru

td

Chad

pf

French Polynesia

tf

French Southern Territories

pg

Papua New Guinea

tg

Togo

ph

Philippines

th

Thailand

pk

Pakistan

tj

Tajikistan

pl

Poland

tk

Tokelau

pm

St. Pierre and Miquelon

tm

Turkmenistan

pn

Pitcairn

tn

Tunisia

pr

Puerto Rico

to

Tonga

pt

Portugal

tp

East Timor

pw

Palau

tr

Turkey

py

Paraguay

tt

Trinidad and Tobago

qa

Qatar

tv

Tuvalu

re

Reunion

tw

Taiwan

ro

Romania

tz

Tanzania

ua

Ukraine

vi

Virgin Islands (US)

ug

Uganda

vn

Viet Nam

uk

United Kingdom

vu

Vanuatu

um

US Minor Outlying Islands

wf

Wallis and Futuna Islands

us

United States

ws

Samoa

uy

Uruguay

ye

Yemen

uz

Uzbekistan

yt

Mayotte

va

Vatican City State

yu

Yugoslavia

vc

Saint Vincent and The Grenadines

za

South Africa

ve

Venezuela

zm

Zambia

vg

Virgin Islands (British)

zr

Congo (Democratic Republic of Congo)

zw

Zimbabwe

coupler

A small device for connecting two cables to make a longer cable, sometimes called an inline coupler.

Overview

Inline couplers do not provide any amplification or signal boost, and can cause attenuation and signal degradation unless they are of high quality. One example would be a small box that accepts two Category 5 (Cat5) cables with RJ-45 connectors and links them to form a longer cable. Another example would be the BNC barrel connector for joining two lengths of thinnet cabling. A third example would be a coupler with two RJ-11 connectors for joining two phone lines.

Coupler. A Category 5 UTP (unshielded twisted-pair) coupler.

The term coupler is also used to refer to modular connectors that can snap into customizable patch panels to allow different kinds of cabling to be mixed in one patch panel.

CPE

Stands for customer premises equipment (CPE), telecommunications equipment that is installed at the customer's location.

See Also customer premises equipment (CPE)

CRC

Stands for cyclical redundancy check, an error- checking technique for ensuring packets are successfully delivered over a network

See Also cyclical redundancy check (CRC)

Creator Owner

A Microsoft Windows 2000, Windows XP, or Windows .NET Server built-in identity that is used as a security context for running services and operating system functions.

Overview

The membership of the Creator Owner system group cannot be modified directly. The Creator Owner system group includes only the user who created or took ownership of a network resource and is functionally equivalent to that user's primary group. The Creator Owner system group has full permissions on the resource, but the rights of the Creator Owner system group cannot be modified. Whoever creates a file system object or print job becomes the Creator Owner of that object or job.

See Also built-in identities

credentials

Information required from users who want to log on to a network and access its resources.

Overview

Credentials, which are formed by combining a user's username and password, identify users so that they can be authenticated by the network security provider. Credentials for access to one network do not guarantee access to another network.

In networks that are based on Microsoft Windows NT, Windows 2000, and Windows .NET Server, computers called domain controllers are responsible for authentication of user's credentials. In addition, trust relationships can be established between Windows NT domains to allow user's credentials to be authenticated from anywhere in the enterprise. Windows NT, Windows 2000, Windows XP, and Windows .NET Server support single- user logon, which allows a user to use a single set of credentials for accessing resources anywhere on a network.

See Also authentication protocol ,password ,username

crimper

A cabling installation tool used for attaching connectors to cabling.

Overview

Crimpers are used to terminate cables by applying appropriate pressure to contacts within a connector so that it remains physically attached to the cable without soldering. A crimper is an essential component of a network administrator's toolkit. Crimpers can include built-in strippers for removing the outer insulation from a cable. They can include a set of dies for crimping different kinds of connectors, or they can be specialized for a single type of termination. Crimpers are most often used for terminating Category 5 (Cat5) unshielded twisted-pair (UTP) cabling with RJ-45 connectors. A good crimper should be made of heavy-duty metal and be able to cut, strip, and terminate a cable easily.

Crimper. A crimper with connector set.

See Also cabling ,connector (device)

CRL

Stands for certificate revocation list, a list, maintained by a certificate authority (CA), of digital certificates that have been issued and then later revoked.

See Also certificate revocation list (CRL)

CRM

Stands for Customer Relations Management, a type of business application used to manage business-to- consumer (B2C) connections

See Also Customer Relationship Management (CRM)

crossover cable

Twisted-pair cabling with the send and receive pairs of wires crossed.

Overview

Crossover cables are primarily used for connecting hubs to each other. In addition, a small, two-station local area network (LAN) can be established by connecting two computers together with 10BaseT network interface cards (NICs) and a crossover cable. This configuration is often utilized when one computer is used to test the networking functions of another because it allows the computer being tested to be isolated from the network. The illustration shows the pinning configuration of a crossover cable.

Crossover cable. Pinning for a crossover cable.

See Also cabling ,twisted-pair cabling

crosstalk

A form of interference in which signals in one cable induce electromagnetic interference (EMI) in an adjacent cable.

Overview

The ability of a cable to reject crosstalk in Ethernet networks is usually measured using a scale called near-end crosstalk (NEXT). NEXT is expressed in decibels (dB), and the higher the NEXT rating of a cable, the greater its ability to reject crosstalk. A more complex scale called Power Sum NEXT (PS NEXT) is used to quantify crosstalk in high-speed Asynchronous Transfer Mode (ATM) and Gigabit Ethernet (GbE) networks.

The twisting in twisted-pair cabling reduces the amount of crosstalk that occurs, and crosstalk can be further reduced by shielding cables or physically separating them. Crosstalk is a feature of copper cables only-fiber-optic cables do not experience crosstalk. Crosstalk can be a problem for unshielded twisted-pair (UTP) cabling. To minimize crosstalk, make sure that

See Also cabling ,near-end crosstalk (NEXT)

CryptoAPI

A core component of the latest versions of Microsoft Windows that provides application programming interfaces (APIs) for cryptographic security services that provide secure channels and code signing for communication between applications.

Overview

CryptoAPI provides a set of standard Win32 libraries for managing cryptographic functions using a single consistent interface independent of the underlying cryptographic algorithms and ciphers. CryptoAPI interfaces with modules called cryptographic service providers (CSPs), such as the Microsoft RSA Base Cryptographic Provider, to provide cryptography functions such as hashing, data encryption and decryption, key generation and exchange, digital signature issuance and verification, and so forth.

CryptoAPI is natively supported by the latest versions of Windows NT, Windows 98, Windows 2000, Windows XP, and Windows .NET Server. Microsoft Internet Explorer version 4 provides CryptoAPI support for Windows 95. The current version of CryptoAPI is version 2.

See Also cryptography

Cryptographic Message Syntax Standard

A standard that defines the general syntax for data that includes cryptographic features such as digital signatures, encryption, and certificate chains.

Overview

Cryptographic Message Syntax Standard, also known as PKCS #7, specifies the format in which the data is signed and encrypted, and the types of encryption algorithms used.

Data encrypted according to the PKCS #7 standard can have multiple digital certificates attached, including certificate revocation lists (CRLs). Certificates include information concerning the issuer and serial number of the public key of the signer so that the recipient can decrypt the message.

See Also cryptography ,digital certificate ,encryption

cryptography

In networking and telecommunications, the process of securely transmitting data over a network in such a way that if the data is intercepted, it cannot be read by unauthorized users.

Overview

Cryptography involves two complementary processes:

Encryption and decryption are performed using algorithms and keys. An algorithm, a series of mathematical steps that scrambles data, is the underlying mathematical process behind encryption. There are a variety of cryptographic algorithms that have been developed based on different mathematical processes.

Some algorithms result in stronger encryption than others-the stronger the algorithm, the more difficult the encrypted data is to crack. For example, Network and Dial-up Connections in Microsoft Windows 2000 supports standard 40-bit RAS RC4 encryption, but if you are located in the United States or Canada, you can get a stronger 128-bit version. Similar versions are offered for Windows NT.

Encryption algorithms involve mathematical values called keys. Earlier cryptography systems were secret key encryption systems in which only the hosts involved in transmitting and receiving the encrypted transmission knew the key. This key had to somehow be transported securely to anyone needing to decrypt a message. This was the main disadvantage with secret key cryptosystems.

Most cryptography today involves a process called public key encryption, which uses two different keys:

To send an encrypted message, the sender uses his or her private key to encrypt the data, and the recipient uses the sender's public key to decrypt it. Similarly, the recipient can return a response to the original sender by using the sender's public key to encrypt the response, and the original sender uses his or her private key to decrypt it.

See Also digital certificate ,public key cryptography

CSMA/CA

Stands for Carrier Sense Multiple Access with Collision Avoidance, the media access control method used by AppleTalk.

See Also Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

CSMA/CD

Stands for Carrier Sense Multiple Access with Collision Detection, the media access control method used by half-duplex Ethernet networks.

See Also Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

CSNW

Stands for Client Services for NetWare, a Windows 2000, Windows XP, and Windows .NET Server service that provides Microsoft Windows clients with access to Novell NetWare file, print, and directory services.

See Also Client Services for NetWare (CSNW)

CSP (caching service provider)

Stands for caching service provider, a company that maintains caching servers that speed the transfer of information across the Internet's infrastructure and offers managed access to these servers for a fee.

See Also caching service provider (CSP)

CSP (commercial service provider)

Stands for commercial service provider, typically Internet service providers (ISPs), online service providers, telephone and cable network operators, and other companies.

See Also commercial service provider (CSP)

CSS

Stands for cascading style sheets, a method for giving Web developers more control over how the pages of a Web site will look when displayed on a Web browser.

See Also cascading style sheets (CSS)

CSU

Stands for Channel Service Unit, a device that is used to connect a synchronous digital telecommunications line to a computer network.

See Also Channel Service Unit (CSU)

CSU/DSU

Stands for Channel Service Unit/Data Service Unit, a device that combines the functions of both a Channel Service Unit (CSU) and a Data Service Unit (DSU).

See Also Channel Service Unit/Data Service Unit (CSU/DSU)

.csv file

A text file having the extension .csv, which contains fields of data separated by commas and a carriage return/linefeed at the end of each record. The extension .csv stands for comma-separated values.

Overview

These files are often used as a standard format for importing and exporting information between applications. For example, in Microsoft Exchange Server you can modify the properties of a group of mailboxes by exporting the properties of the mailboxes to a .csv file, opening this file as a spreadsheet in Microsoft Excel, modifying the properties using string functions and search/replace, exporting the information back into another .csv file, and then importing the modified file back into Exchange. Many applications can export log files or other information as .csv files. These files can then be imported into a spreadsheet or database program where they can be subjected to further inspection and analysis. Graphics and charts can also be generated from the imported information.

CTEC

Stands for Certified Technical Education Center, an education-delivery company such as a school or training center that is been qualified by Microsoft Corporation for the delivery of Microsoft Official Curriculum (MOC) courseware.

See Also Certified Technical Education Center (CTEC)

CTI

Stands for computer-telephony integration, a general term describing the integration of computer and telephone technologies.

See Also computer-telephony integration (CTI)

Ctrl+Alt+Delete

A control sequence that has different effects depending upon the operating system involved.

Overview

Holding down the Control, Alt, and Delete keys simultaneously produces the following results (depending upon the operating system being used):

See Also secure attention sequence (SAS)

custom authentication

Any user-created method for authentication of clients on a network.

Overview

Microsoft Internet Information Services (IIS) lets you create custom authentication schemes to control access to Web content. These can be implemented using several different technologies, including Active Server Pages (ASP), Internet Server API (ISAPI) authentication filters, or Common Gateway Interface (CGI) applications. For example, using any of these technologies, you can create an authentication scheme to

See Also authentication protocol

Customer Information Control System (CICS)

Customer Information Control System (CICS) enables transaction-based applications to operate on IBM mainframe systems. More than half of all mainframes running today still use some CICS applications. Traditionally CICS-based applications are accessed using legacy IBM 3270 text-based terminals, but newer products allow CICS transactions to be wrapped in Hypertext Markup Language (HTML) for access by Web browsers. One such product is Shadow AutoHTML for CICS/TS from Neon Systems, which also supports Open Database Connectivity (ODBC) interfaces for CICS applications.

For More Information

Find Neon Systems at www.neonsys.com

See Also Systems Network Architecture (SNA)

customer premises

A general term referring to your local company's networking environment.

Overview

The term customer premises is typically used by service providers who provide leased or contractual services to help you implement and support your network. For example, a cabling company would install cabling at your customer premises and call this installation "premise wiring." A telecommunications company might send a representative to a customer premises in order to install a Channel Service Unit/Data Service Unit (CSU/DSU) or other device in the wiring closet to enable wide area network (WAN) communication. Typically, your company is responsible for the physical security of such installed equipment, but the actual configuration and monitoring of the equipment often takes place at the telco's central office (CO).

See Also customer premises equipment (CPE) ,enterprise resource planning (ERP)

customer premises equipment (CPE)

Telecommunications equipment that is installed at the customer's location.

Overview

Customer premises equipment (CPE) is installed to terminate wide area network (WAN) links and local loop connections between the customer and the carrier's central office (CO) and to route traffic between the customer premises and the carrier from which telecommunications services are leased. Common examples of customer premises equipment include telephones, modems, Channel Service Unit/Data Service Units (CSU/DSUs), Private Branch Exchanges (PBXs), and Integrated Access Devices (IADs) routers.

Generally, the telecommunications service provider is responsible for configuring and monitoring the equipment, which is purchased or leased by the customer from the carrier. For example, when installing a CSU/DSU as a termination for a T1 line, the configuration of the CSU/DSU is likely to have been done previously by the service provider. The carrier then uses Simple Network Management Protocol (SNMP) and loopback monitoring to determine, from its central office, whether the remotely installed equipment is functioning correctly.

Alternatively, customers may purchase or lease their own CPE from third-party vendors. In this case the customer is usually responsible for configuring and monitoring the equipment. In general, cost/benefit is usually on the side of leasing CPE from the provisioning carrier because the cost of replacing defective or failed equipment or upgrading equipment to support enhanced services is the burden of the carrier.

See Also carrier ,customer premises local loop, telecommunications services, wide area network (WAN)

Customer Relationship Management (CRM)

A type of business application used to manage business-to-consumer (B2C) connections.

Overview

Customer Relationship Management (CRM) software is used to manage mission-critical business information concerning the direct relationship between a business and its clients. CRM enables business users to quickly and easily access up-to-date information concerning client accounts, and it provides the tools for managing and growing a company's relationship with its customers. CRM software enables a business to manage leads, distribute timely information to customers, and coordinate a multitude of other customer-centric activities.

Marketplace

Some of the bigger players among CRM vendors include Onyx Technology, Pivotal Software, and Siebel Systems. CRM software takes a variety of forms depending on whether it is being implemented in small, mid-sized, or enterprise-level businesses. Some CRM vendors build their products around customer databases, while newer players and CRM startups often use the application service provider (ASP) model for outsourcing CRM needs.

The worldwide market revenue for all forms of CRM software and services was estimated at over $10 billion in 2000 and may reach $25 billion by 2003, according to some analysts.

Notes

A recent offshoot of CRM is partner relationship management (PRM), which helps companies to manage the more indirect relationship they have with business channels and supply chain partners, among others. Besides the big CRM players, a number of emerging pure-play PRM vendors are attracting market share. These include Allegis, ChannelWave, and many others.

See Also B2B ,enterprise resource planning (ERP)

custom recipient

A recipient in Microsoft Exchange Server that does not reside in the Exchange organization.

Overview

When creating a custom recipient, you specify the e-mail address of the remote user first, and then configure the properties of the recipient. An example of a custom recipient is the Simple Mail Transfer Protocol (SMTP) address of a user on the Internet.

Custom recipients are often created on Exchange servers to place frequently used foreign addresses in the global address book so that users do not have to specify the recipient's e-mail address manually or maintain their own personal address books. Custom recipients can be used for various other purposes in Exchange, such as to enable a user's Internet mail to be forwarded to his or her Exchange mailbox.

cyclical redundancy check (CRC)

An error-checking technique for ensuring that packets are successfully delivered over a network.

Overview

A cyclical redundancy check (CRC) is a number that is mathematically calculated for a packet by its source computer and then recalculated by the destination computer. If the original and recalculated versions at the destination computer differ, the packet is corrupt and needs to be resent or ignored.

The mathematical procedure for performing a CRC is specified by the International Telecommunication Union (ITU) and involves applying a 16-bit polynomial to the data being transmitted by the packet for packets of 4 KB of data or less, or a 32-bit polynomial for packets larger than 4 KB. The results of this calculation are appended to the packet as a trailer. The receiving station applies the same polynomial to the data and compares the results to the trailer appended to the packet. Implementations of Ethernet use 32-bit polynomials to calculate their CRC.



Microsoft Encyclopedia of Networking
Microsoft Encyclopedia of Networking
ISBN: 0735613788
EAN: 2147483647
Year: 2002
Pages: 36
Authors: Mitch Tulloch, Ingrid Tulloch
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net