`
`
`
` .\ \
`
`:~-'."'»\» .)!~;i
`;,.a‘.a.»'.xl\‘..\";%\
`‘fiT1;;I5‘.‘§:‘:|$“.’::\‘.y‘Z\
` i\\\'\‘ I
`
`
`
`
`
`
`
`A Des/atop Qutc/e Reference
`for System Administrators
`
`Eric Pearce
`
`1
`
`APPLE 1025
`
`1
`
`APPLE 1025
`
`
`
`
`
`INDOS N
`
`A Desktop Qaic/e Reference
`for System Administrators
`
`by Eric Pearce
`
`Graphic interface mapping
`by Cloris Reilley and Beverly Murray Scberf
`
`O’RE|LLY"
`
`Cambridge
`
`~ Koln
`
`° Paris
`
`-
`
`Sebastopol
`
`~
`
`Tokyo
`
`
`
`2
`
`
`
`Windows NT in a Nutshell
`
`by Eric Pearce
`
`Copyright © 1997 O’Reilly 8: Associates, Inc. All rights reserved.
`Printed in the United States of America.
`
`Published by O’Reilly 8; Associates, Inc., 101 Morris Street, Sebastopol, CA 95472.
`
`Edif0I‘.' Robert Denn
`
`Production Editor: Nancy Wolfe Kotary
`
`Printing History:
`
`June 1997:
`
`First Edition.
`
`Nutshell Handbook and the Nutshell Handbook logo are registered trademarks and
`The Java Series is a trademark of O‘Rei1ly & Associates, Inc.
`
`Many of the designations used by manufacturers and sellers to distinguish their
`products are claimed as trademarks. Where those designations appear in this book,
`and O’Reilly 8: Associates, Inc. was aware of a trademark claim, the designations have
`been printed in caps or initial caps.
`
`While every precaution has been taken in the preparation of this book, the publisher
`assumes no responsibility for errors or omissions, or for damages resulting from the
`use of the information contained herein.
`
`3&9
`This book is printed on acid-free paper with 85% recycled content, 15% post—consumer
`Waste. O’Reilly & Associates is committed to using paper with the highest recycled
`content available consistent with high quality.
`
`ISBN: 1-56592-251-4
`
`[3/98]
`
`3
`
`
`
`
`
`E l i
`
`»
`
`1
`
`Summary
`The Client Service for NetWare control panel allows the computer to accessfile
`and print services from the Novell NetWare server. The CSNW Control Panel
`assumes you have a previously installed and working Novell server to connect
`to and a valid username and account on the Novell server.
`
`
`S
`S
`if
`i
`- Tree
`I
`0 Usernume
`E
`- Context
`2
`0 Preferred Server
`~
`~
`' ~ r ~ ‘-
`0 Defuultlree and (ontext — 4
`O Print Options- 0 Add Form Feed
`I logln S(rlpt0 lions —-—-——l— R
`L
`I 5 r
`5 *
`0 Notify When Printed
`0 Overview (hep)
`E
`0 Prim Banner
`
`0 Selert Prelerred Server
`-(urrentPreterredServer
`
`i3
`
`V
`
`1
`
`Username
`
`Shows name of currently logged—on user. If the Windows NT password for this
`username is different from the password on the Net\X/are server, you will get a
`second login prompt while attaching to the Net\X/are server.
`Preferred Server
`
`Displays current preferred server for non—NDS (Net\X/are Directory Services)
`environments (such as Netware 3.x).
`
`Select Preferred Server [Preferred Sewer]
`The scroll list contains a list of NetWare servers discovered on the network. If
`
`the list is empty, there may be a communications problem between the local
`computer and the NetWare server.
`
`Check the Frame Type settings for the IPX Protocol in the Network control
`panel to see if they match those being used by the Net\X/are server; this should
`be visible from the net view /networ/e.-nw command. The rpxrozrte command is
`useful for learning the frame types in use on the network.
`Default Tree and Context
`
`Defines NDS name and position of your login username for NDS environments
`(Net\X/are 4.x).
`
`Run login Script [login Srript Options]
`Run login script when logging in to Net\X/are sewer.
`
`2
`
`3
`
`4
`
`5
`
`Devices
`
`Requires
`NT Workstation or Server
`
`Summary
`The Devices control panel shows the current status of device drivers, and
`allows you to stop and start them and to modify their startup behavior. Its pri-
`mary use is customizing hardware profiles and disabling installed hardware. A
`device driver must be loaded and running in order for a higher level service or
`program to use it. If you are creating a hardware profile, use the Devices con-
`trol panel to control how or if a device driver is started for the profile. If you
`
`.
`1
`
`.‘
`;
`
`I
`
`1
`‘
`
`*5
`
`.;
`
`8 C/oapter2— The Control Panel
`
`
`
`4
`
`
`
`
`
`I
`
`have hardware installed that you want to make unavailable, disabling the
`device driver for that hardware prevents the system from using it.
`
`Device
`
`1
`
`Devices
`Status
`5'0”
`Stop
`2
`Sturtup
`HW Profiles -— 3 E
`
`
`
`~
`
`Devire
`0 Deviie
`I
`0 Disable
`
`‘!
`
`2
`
`,
`Status
`If the Status field is blank, the device driver is not loaded.
`Sturtup
`There are five startup types:
`Boot
`
`Start upon system boot before other device drivers
`
`System
`Start upon system boot after Boot device drivers
`Automatic
`
`Start upon system boot after System device drivers
`Manual
`
`Start only when requested by system or user
`Disabled
`
`Start only when requested by system, unavailable to users
`HW Profiles
`
`3
`
`Enable or disable devices for a specific hardware profile. Changes will take
`effect only after the next reboot.
`
`Dial-Up Monitor
`
`Requires
`NT Workstation or Server
`Remote Access Server (RAS)
`
`Summary
`The Dial-Up Monitor control panel can be used to display various statistics
`about a Dial—Up Networking RAS session. It is normally used to monitor a PPP
`or SLIP session running over an analog phone line or ISDN line, but it can also
`monitor a PPTP session. Dial-Up Monitor may be useful when debugging
`errors that occur after a RAS session is successfully started, such as line errors
`or errors caused by insufficient system resources.
`
`Dial-Up Monitor 9
`
`
`
`5
`
`
`
` 3
`
`4
`
`HW Profiles
`Once you have a created a hardware profile using the System control panel,
`you can determine which services should be started when using the profile.
`For example, if you created two profiles for a laptop for office and home use,
`you could turn off most of the network services for the home profile. Remem-
`ber that the device drivers listed in the Devices control panel also have to be
`configured and running for the profile in order for the services to make use of
`them.
`
`Allow Service to Interact with Desktop [Siurtuplog 0nAs~System Account]
`Enable this option if the service needs to prompt a user for input. If the ser-
`vice tries to access the desktop for some reason (such as an error) and cannot,
`the service may hang or stop functioning.
`
`1
`1
`
`r
`
`5
`
`Sturtup Parameters
`If the service needs parameters when it is started, these can be entered here.
`The backslash character (\) is an escape character and must be protected by
`another backslash. For example,
`if you Wanted to pass the UNC name
`\\NTSRV1 to a service, it would have to be typed as \\\\NTSRV1.
`
`System
`
`Requires
`NT Workstation or Server
`
`Summary
`
`The System control panel is a catchall for settings and information that did not
`justify separate control panels. You can change environment variables, paging
`behavior, application priority, the startup menu, and create, copy, and delete
`hardware and user profiles.
`
`4‘
`
`i
`
`A
`
`52 Chapter 2 — The Control Panel
`
`6
`
`
`
`
`
`Pgrfofmumg
`W V
`
`Environment
`—«
`r
`
`5l‘"l“P/Sll”l‘l°Wfl l
`’
`“‘
`“"""’ "
`
`7 V
`
`Hardware
`Profiles
`_,
`
`General
`—
`
`—
`
`1
`
`~
`
`i-— ° System
`«F
`0 Registered to
`0 (omputer
`
`‘
`
`é
`
`0 Appliration Performance
`Select the performance boost for the loreguund application
`- Roost
`llane/Maximum
`0 Virtual Memar
`Total paging hie size for all disk volumes
`(hange
`
`
`
`It
`
`_
`E
`E
`V
`
`§— - System Variables
`0 User Variables farx
`- Variable
`- Value
`I Set
`' llelele
`U M
`
`
`5
`
`.5y5r9msga.1up
`gram,
`Show llsi for x seconds
`6
`. Rewveyy
`Write an event to the system lag
`Send (allg1flml|ll$lffJfffV9 file”
`Write
`e u ging in ormation to
`Dverwrite aag existing file
`Automaticalh reboot
`
`l
`i
`
`§
`l
`A
`
`Vl"”°l M°m°'Y
`0 Drive (Volume label)
`0 Paging file Size for Selected Drive
`Drive
`Space Available
`initial Size (MB)
`Maximum Size (MB)
`0 Total Paging file Size for All Drives
`Minimum Allowed
`Recommended
`CurrentlyAllocated
`' lle9l$lfY 5'10
`Current Registry Size
`M
`‘UY 910
`V WfWfmm‘“frN H
`
`‘
`
`
`
`0 Available Hardware Profiles
`° UP/DOW"
`I Properties
`C
`
`: Rl;$zm9
`' D
`l
`0 Mfrflidle Hardware Profiles
`Wait indefinitely for user selection
`Wait for user selection for x seconds
`soll?‘itlfilllfl!ll'T??'1‘?i‘l?_{Pf?l§5'i’PF?tor
`
`
`
`Copy Profile
`0 From
`ff:
`
`ll°'""“° Pmllle
`'¥!0m
`' 0
`’“"'”'“' ’”""
`
`
`
`'
`
`5
`
`
`'°P°’.l 9"
`General
`0
`
`8
`
`9
`
`i
`:
`
`
`
`5
`:
`
`local Group Membership
`. Mamba; of
`. Membm
`ll
`“Ml A“°"“l
`0 Find User or Group
`- Searrhh N
`Searc A
`Search Only in
`Searrb Results
`Add
`
`(onliguration
`
`S°_'l",l ll‘"“l’°'
`llfi: '5d“ il’(‘_"l°l’l°r‘°_"iP”Il(9'
`“I: urn lflfleillus
`"ow"
`Thetomrllutelisvndotked
`
`5 Network
`0 Select this check box to disable all
`networkdevicesfor thishardwareprofile
`Clear this check box to re-enable a I
`network devices for this hardware profile.
`Network-disabledhardwareprofile
`
`
`
`Change Type
`0 Prolile Type
`ll
`l°<°l Pi°lll°
`12 .
`Roaming profile
`Use cached profile on slow connections
`..
`,_
`. ., ,
`Choose User
`0 list Names From
`0 Names
`0 Alrlld
`U
`0 S aw sers
`- Members
`0
`ame
`0
`
`.
`.
`_
`User Profiles
`l0 E—- ‘ |l;tiil|l€$Sl0i9il 0“llili ¢°"iPUl9i
`° 9 Pl?
`‘""""""vfi“
`‘ (l|0"U° fYP°
`W”
`
`
`
`V
`
`?
`l
`
`.
`
`(apy To
`0 (opy profile to
`Browse
`0 Peilmitted to use
`E ange
`“
`
`i3
`
`14
`" s’ ' *
`
`General
`
`
`
`Displays information about this computer. This would have been a great place
`to indicate whether the system was running Workstation or Server and what
`service packs are applied. (Service pack information is available in Version tab
`of Windows NT Diagnostics and the Help-About Windows NT menu item on
`most tools and control panels.)
`
`ir
`
`l
`
`System 53
`
`7
`
`
`
` 2
`
`Boos! [Performance]
`Change the priority of the foreground application. You may want to move the
`slider bar to None for servers that are not being used from the console.
`
`
`
`3
`
`4
`
`3.“:
`
`Change [Perlormanre~Virrual Memory]
`Windows NT uses virtual memory, which allows the memory available to
`processes to be larger than the amount of physical memory (RAM) installed in
`the computer. Memory being used by inactive processes is paged out (stored
`on disk) to make room in the physical memory for active processes. The size
`and location of the paging file can affect system performance. For example, if
`you have several drives with different speeds, putting the page file on the
`fastest drive improves performance. Spreading the page file across several
`drives improves performance by distributing disk I/O.
`
`System Variables [Environment]
`Variables are used by the system and users to locate files and set various
`parameters at run time. For example, if you want to add a command in a new
`directory, you need to add the directory to the Path variable in order for the
`system to find the command. All the directories in the Path variable are
`searched in order when you are using the command line or the Start-Run
`menu. Changes take effect the next time an application is started.
`
`System Slarlup [Starrup/Shutdown]
`the startup menu (read from
`When using a dual- or multiple—boot system,
`BOOTJNI) selects which operating system to boot. You can change the default
`operating system or timeout.
`
`6
`
`Recovery [Slartup/Shutdown]
`If an NT application crashes, you can tell the system to record the event or
`create debugging information.
`7 Hardware Profiles
`
`Hardware profiles are a Way to manage different hardware configurations. The
`classic example is the laptop computer that needs different PC Cards to func-
`tion depending on where it is being used. For example, it needs an Ethernet
`card when connected to a LAN, and a modem card when not connected to the
`LAN. A computer using hardware profiles presents you with a menu before
`booting NT (and before any Startup BOOT.INI menu). Once you have created
`a hardware profile using the System control panel, the Devices and Services
`control panels are used to customize which device drivers are loaded and
`which services are started for the specific profile.
`
`8 General [Hardware Profi|esvProperfies]
`Some laptops have a dock to plug into at a fixed location such as an office.
`The docking unit usually contains network interfaces or other features that are
`not required when the laptop is in an undocked state.
`
`9 Network [Hardware Profiles-Properties]
`As one of the most common uses of hardware profiles to switch between net-
`work and non-networked settings, this setting will turn off all network devices
`for the non-networked profile.
`
`.
`'
`
`*
`
`,
`j
`
`r
`
`.
`l
`
`54 Claapter2— The Control Pcmel
`
`
`
`8
`
`
`
`: E
`
`/sued [wrung
`
`
`
`lil
`
`User Profiles
`
`User profiles keep track of personal settings, such as the appearance of the
`Desktop and Start menu contents. You can set up multiple users with the same
`settings by copying user profiles from one user account to another.
`
`local profile [User Proliles-Change TypeProlile Type]
`A local profile is associated with a specific computer.
`
`Roaming profile [User Profiles-Change lypeProfile Type]
`A roaming profile follows users regardless of what computer they are using.
`
`Copy prolile to [User Profilestopy [0]
`Copy the selected profile to a new location.
`
`Permitted to use [User Profiles-Copy To]
`Control which user or group can use the profile.
`
`ll
`
`l2
`
`l3
`
`l4
`
`Tape Devices
`
`Requires
`NT Workstation or Server
`
`Summary
`
`The Tape Device control panel installs, configures, or removes tape devices
`from the local computer. This includes SCSI, IDE, floppy, and parallel port
`drives.
`'
`
`If you are adding new hardware, the Resources tab of the Windows NT Diag-
`nostics tool is a good place to look for system—wide resource settings. Carefully
`choose the new settings to avoid conflicts with existing hardware.
`
`Tape Devires
`
`
`Devices
`~ ~-=-/-~ is
`
`1
`
`~
`
`Drivers
`-
`—-
`
`-lope deviresure lisied
`' Properties ifoniexr Sensitive)
`0 Deleri
`
`2
`
`V
`
`D
`
`D
`
`H
`
`D
`
`D
`
`D
`
`3 i—_ 0 lnsiulled drivers are listed
`v — ~
`0 Add
`0 Remove
`
`_
`
`l
`
`lnslall Driver
`
`- Munulariurers
`0 Tape Devires
`° Have Disk
`
`l
`
`Devices
`
`Displays a list of all detected tape devices.
`
`Detect [Devices]
`
`r
`
`If you have just installed new tape hardware, the Detect button tells the sys-
`tem to try to find it and load the appropriate driver.
`Drivers
`
`Displays a list of all tape device drivers being used.
`
`Tape Devices 55
`
`9
`
`
`
`
`
`tn
`
`'5U)
`
`S
`
`Glossary
`
`ACL (Access Control List)
`
`Contains all permissions information for a file, directory. This is similar
`to the DACL that controls access to registry keys.
`
`adapter
`
`answerfile
`
`AppleTal/e
`
`Usually, the network adapter card that connects a computer to a LAN.
`A display adapter is a video card that drives the computer monitor.
`
`Read by programs in place of keyboard input. They are most com-
`monly used to configure the operating system during unattended
`installation.
`
`Native network protocol of Apple Macintoshes.
`
`ARP (Address Resolution Protocol)
`
`Allows a computer running TCP/IP to find the MAC-level address for a
`given IP address.
`
`auditing
`
`Process of recording security—related events such as file access and
`user logons. System administrators can use audit information to track
`resource usage, discover break—in attempts, and debug security prob-
`lems.
`‘
`
`authentication
`
`Process of verifying that a computer or user actually is who they are
`claiming to be.
`
`BDC (Backup Domain Controller)
`Provides some fault tolerance and load distribution for the NT domain
`system. It can reduce the load on a PDC or take over from a failed
`PDC.
`
`517
`
`10
`
`10
`
`
`
`
`
`;
`
`l
`
`3
`
`5s
`
`i llii
`
`i
`
`binary value
`A base~2 number, which is either a 0 or 1.
`
`bindings
`
`Association of a network protocol and service with a specific network
`interface.
`
`BIOS (Basic Inpm‘/Output System)
`Very low—level program that interacts directly with the PC hardware.
`You may have to change BIOS settings to enable slots on the mother-
`board, cache memory and so on.
`
`v
`
`bridge
`
`buffer
`
`bus
`
`cache
`
`callback
`
`capture
`
`Connects two networks at the MAC—leVel, forwarding traffic from one
`to the other. It works with any network protocol, as it does not exam-
`ine the packets at the protocol level. Most bridges are smart enough to
`know which computers are each side of the bridge and only transmit
`traffic if it needs to go from one side of the bridge to the other. Broad—
`casts are propagated by bridges.
`
`I
`Unit of memory storage. Number or size of the buffers determines the
`amount of available storage.
`
`Shared communications path. For example: SCSI bus, PCI bus, and ISA
`bus.
`
`Unit of memory dedicated to holding recently used information in the
`hope that it will be used again, therefore increasing performance as
`opposed to reading or writing to disk.
`
`In RAS, the ability of a remote userto call a RAS server and have the
`RAS server hang up and call them back. This can be used to reverse
`call charges or enhance security.
`
`To read the network traffic from an interface using a tool such as Net-
`work Monitor.
`
`CHAP (Challenge Hcmdslaalee Autberrfication Protocol)
`One of the authentication protocols used by PPP to authenticate a con-
`nection. It encrypts the password before sending it over the connec-
`tion, preventing it from being intercepted in clear text.
`
`client
`
`It is one of the
`Program or computer making a request of a server.
`most over-used words in computing and has to be evaluated in the
`context that it is used.
`
`318 Glossary
`
`11
`
`11
`
`
`
`3‘<
`
`m '
`
`E«'4
`
`DACL (Discretionary Access Control List)
`Allows a selected list of users and groups to perform some action. For
`example, registry keys in the Windows NT Registry can be assigned
`DACLs, enabling some users to edit them and blocking others.
`
`databtts
`
`Number of bits that represent actual data, as opposed to signaling bits,
`such as stop, start, and parity bits. Usually used when talking about
`asynchronous serial communications, such as RS252.
`
`DDE (Dynamic Data Exchange)
`Microsoft Windows applications use DDE to exchange data. DDE
`enables data to be linked and simultaneously changed in all applica-
`tions.
`
`default gateway
`Router where all traffic to unknown networks is sent.
`
`default router
`See default gateway.
`
`DHCP (Dynamic Host Configuration Protocol)
`Protocol used to make TCP/IP plug—and—play. A computer that wishes
`to use TCP/IP broadcasts for a DHCP server. The DHCP server
`responds with a TCP/IP configuration for the client.
`
`DLC (Data Ltnle Control)
`Protocol used by NT to communicate with IBM mainframes and HP
`printers.
`
`domain, NTsecurtty
`Group of computers that share a common security scheme. All user-
`names, group names, and computer names are unique within the
`domain.
`
`clomatn, TCP/1P
`
`Defines an organization within the Domain Name System (DNS). For
`example, orez'lly.com.
`
`DSN (Data Source Name)
`
`Describes an ODBC database. Database clients wishing to interact with
`the database address the database by its DSN.
`
`DUN (Dz'al—Up Networking)
`Client side of RAS. It enables a Windows NT Workstation or Server to
`dial out to another computer or the Internet.
`'
`
`DW/ORD
`
`Data type used within Win32 programming. It also appears as a data
`type within the Registry. It is displayed as four bytes of hexadecimal
`data.
`
`enterprise serz/er
`
`NT Server that manages a resource (such as licensing) for an entire
`enterprise.
`
`Glossary 319
`
`
`
`12
`
`12
`
`
`
`ERD (Emergency Repair Disle)
`Floppy disk that contains enough information to recover an NT system
`if critical system files are damaged.
`
`1
`
`FAT(File Allocation Table)
`Original DOS filesystem.
`
`file locle
`
`Mechanism to prevent simultaneous writes occurring on the same file.
`The file is “locked”, preventing anyone except the first person who
`opens it from writing to it.
`
`FPN W (File and Print Servicesfor Netll’/are
`Enables an NT Server to act like a Novell NetWare file server and offer
`Net\X/are file and print services to Net\X/are clients.
`
`frame
`
`Single network packet. The term frame is usually used to describe a
`low-level packet type, such as Ethernet and PPP.
`
`F7? (File Transfer Protocol)
`Protocol used by the program of the same name to transfer files over
`TCP/IP.
`
`globbing
`
`Gopher
`
`Wildcard mechanism for matching filenames. For example, “?” matches
`any single character within a filename and “*” matches zero or more
`characters.
`
`Predecessor of HTTP. It provided a menu—driven interface to text and
`graphic information.
`
`GSNW (Gateway Servicefor Netu’/are)
`Allows an NT Server to connect to a Novell Net\X/are server and redis-
`
`tribute Net\X/are file and print resources to Microsoft Networking cli-
`ents.
`
`GUI (Graphical User Interface)
`Windowing system front end to an operating system, such as Windows
`NT and Windows95. Also called a “shell” in some cases.
`
`biz/e
`
`Tree of registry data stored in separate disk file.
`
`HTTP (Hyper-Text Transfer Protocol)
`Protocol used by the World-Wide-Web.
`
`ICMP (Internet Control Message Protocol)
`Maintenance protocol in the TCP/IP protocol suite. Used by the com-
`mands ping and tracert to find and isolate network problems.
`
`IDE (Integrated Drive Electronics)
`Very common and inexpensive disk and CD—ROM interface.
`
`IP (Internet Protocol)
`Native protocol of the Internet, and part of the TCP/IP protocol suite.
`
`320 Glossary
`
`
`
`13
`
`13
`
`
`
`
`
`
`IPX/SPX (Internet Packet Exchange/Sequenced Packet Exchange)
`Used by Novell NetWare to provide datagram and stream—oriented net-
`work services (analogous to UDP and TCP in TCP/IP).
`
`
`
`/f.lE$S0]_l]
`
`ISDN (Integrated Service Digital Network)
`Digital phone line that offers a data rate of 128 Kbps in its most com-
`mon form.
`
`LAN (Local Area Nelworle)
`Group of network devices communicating using Ethernet, token—ring,
`or FDDI within a small area, such as a building or campus.
`
`LCP (Lin/e Control Protocol)
`Subprotocol of PPP used to negotiate PPP options between the PPP
`client and server.
`
`; !
`
`LPD (Line Printer Daemon)
`Protocol and UNIX service for transferring print jobs between TCP/IP
`computers (or networked printers).
`
`MAC‘ (Media Access Control)
`‘
`The MAC layer of networking is the Ethernet or token-ring level, and
`deals with low-level issues such as access and collision detection. A
`
`MAC—level address is usually an Ethernet address. Bridges function at
`the MAC layer and do not decode frames farther than the MAC layer.
`
`migration
`
`mirroring
`
`Process of moving from one operating system to another or from one
`version of an operating system to another.
`
`RAID feature that copies all 1/0 for one disk drive to another, essen-
`tially keeping an online backup.
`
`MS—CHAP (Mlcrosofi‘. CHAP)
`Microsoft-specific version of the Challenge Handshake Authentication
`Protocol (CHAP), which is used to authenticate RAS PPP sessions.
`
`multiboined
`
`A multihomed computer has either multiple IP addresses for a single
`network interface or multiple network interfaces. Web sewers are fre-
`quently multihomed, which allows the web server to serve different
`web content depending on which interface or IP address a client con-
`nects to.
`
`nameseruer, DNS
`Server that accesses the Domain Name system of networked databases
`that converts hostnames to IP addresses and IP addresses to host-
`names.
`
`rzameseruer, NetBIOS
`
`translates NetB1OS computer names to IP
`Usually a WINS server;
`addresses, allowing Microsoft Networking to take place over TCP/IP
`networks.
`
`
`
`Glossary 321
`
`14
`
`14
`
`
`
`NetBEUI (NetBIOS Extended User Interface)
`Non-routable protocol used on small LANs. It is the default networking
`protocol of Windows for Workgroups and Windows 95.
`
`NetBIOS (Networle Basic Input‘/Output System)
`API for Microsoft Networking applications.
`
`NNYP (Network News Transfer Protocol)
`Internet standard for transferring Usenet news articles between com-
`puters.
`
`node type
`
`NYFS
`
`Indicates the NetBIOS name resolution mechanism in use (broadcast
`only, p0int—to—point only, broadcast
`first, point-to—point second, or
`point—to—point first, broadcast second)
`
`Windows NT filesystem.
`
`NVRAM (Non—z)olatile RAM)
`RAM used to store BIOS settings, even with the power off.
`
`ODBC (Open Database Connectivinl)
`Microsoft database interoperability standard that allows ODBC-compli-
`ant applications to connect to ODBC—cornpliant databases.
`
`PAD (Pacleet Assembler/Disassembler)
`Communications device that connects a computer to a packet network;
`such as X.25.
`
`PAP (Password Authentication Protocol)
`PPP authentication protocol. It is a simple exchange of username and
`passwords between client and server.
`
`parity
`
`PC Card
`
`Extra bit (or bits) added to data in serial communications as a form of
`error detection.
`
`New name for the PCMCIA interface. Originally intended for memory
`expansion, the interface is now most commonly used for modern and
`network cards.
`
`PCL (Printer Control Language)
`Hewlett—Packard’s printer language.
`
`PCMCIA (Personal Computer Memory Card International Association)
`Old name for the PC Card interface.
`
`PDC (Primary Domain Controller)
`NT server that controls the security relationship for an NT domain.
`
`port number
`Identifies a specific endpoint of a TCP or UDP connection, which is
`usually a service running on a network device.
`
`
`
`322 Glossary
`
`
`
`15
`
`15
`
`
`
`POSIX (Portable Operating System Interface)
`Set of standards for APIs that are intended to make porting UNIX
`applications easier.
`
`PPP (Pomt—to—Pomt Protocol)
`Standard protocol for creating a network connection across a serial
`line.
`
`PPYP (Point-to-Point Tzmneling Protocol)
`Protocol used to create tunnels across intermediate networks, which
`can be encrypted and carry non-native protocols.
`
`Profile, laczrdzuczre
`Set of device driver and service settings that are associated with the
`presence of specific hardware. A laptop can use a hardware profile to
`disable the network when no network is available.
`
`Profile, Remoteboot
`Combination of operating system type and network adaptor type used
`to boot a computer using the Remoteboot service.
`
`Profile, user
`Collection of personal GUI preferences and settings that is stored on a
`server. This enables a user to log on from different computers and
`always download the same customization settings.
`
`propagation
`Process of transmitting data received from one source to another.
`
`protocol
`
`proxy
`
`Set of standards for network communication.
`
`One computer acting on another computer’s behalf. A WINS proxy
`receives WINS requests and forwards them to a WINS server.
`
`pus/9/pztllparmer
`In WINS, servers that can exchange computer names and addresses.‘
`
`RAID (RedtmdcmtArray ofInexpensive Dis/es)
`Technologies for combining multiple disk drives into a larger virtual
`drive to improve performance or enable fault tolerance.
`
`RAS (Remote Access Service)
`Windows NT facility for creating dialup network connections to other
`computers or the Internet.
`
`~
`Small amounts of NVRAM that store configuration settings on modems.
`
`registers
`
`Registry
`
`Hierarchical database for NT system information.
`
`/{Jessa/9
`
`Glossary 323
`
`16
`
`16
`
`
`
`
`
`registry key
`
`replication
`
`Analogous to a directory in a filesystem. Keys contain subkeys and
`Values.
`
`Process of copying data to different machines, usually with the require-
`ment that it is to be kept consistent everywhere.
`
`RFC (Request For Com.mem‘5)
`Technical document that describes a protocol or standard used on the
`Internet.
`
`RIP (Rowing I7y’ormatz‘on Protocol)
`Most common TCP/IP routing protocol used on small to medium net-
`works.
`
`roclmmg profile
`Profile that follows a user around, allowing him or her to log on from
`different computers and always get the same settings.
`
`rozlter
`
`Routes packets based on destination address.
`propagate broadcasts.
`
`It
`
`typically does not
`
`RTS/CTS (Request To Sena’/Clem‘ To Send)
`Form of hardware flow control used in serial communications.
`
`It
`
`is
`
`typically used on high-speed devices that support the necessary signal-
`ing leads.
`
`SAP (Service Adverflsmg Protocol)
`Microsoft,Netw0rking uses SAP to advertise the availability of shared
`resources, such as files and printers.
`
`sccwengmg
`
`Checking the consistency of a database.
`
`scope, DHCP
`Typically a subnet (defined by a subnet mask) of IP addresses that are
`to be handed out to DHCP clients.
`
`scope, NetBIOS
`Means of grouping computers on the network. Only computers with
`the same scope ID can communicate.
`
`SCSI (Small Computer System Interface)
`Interface standard for disks, tapes, and CD-ROMS. It is usually more
`expensive than IDE, but offers more devices and higher performance.
`
`server
`
`service
`
`Program or computer answering the requests of a client.
`
`Program running on NT that provides some service to the operating
`system, user, or remote computer. Services typically start at boot time
`and run until the computer is shut down.
`
`324 Glossary
`
`17
`
`17
`
`
`
`
`
`seruicepac/e
`
`Microsoft releases a service pack for Windows NT when enough
`bug fixes and features have accumulated after a major release of the
`operating system.
`
`SLIP (Serial Line IP)
`
`Older method of creating a network across a serial line.
`largely supplanted by PPP.
`
`It has been
`
`SMB (Server Message Bloc/e)
`Protocol used for file sharing in Microsoft Networking.
`
`SM77’ (Simple Mail Transport Protocol)
`Defacto standard for exchanging electronic mail on the Internet.
`
`SMS (System Management Server)
`Part of the Microsoft Backoffice suite. It is intended to make manage-
`ment of large numbers of computers easier. It includes the full—featured
`version of the Network Monitor tool.
`
`SNMP (Simple Networle Management Protocol)
`Protocol used by network devices to inform a network management
`console about the status of the network.
`
`SPAP (Sb tz/a Password Authentication Protocol)
`Modified version of the PAP authentication protocol that improves on
`regular PAP by encrypting the password before sending it over the
`PPP connection.
`
`standard error
`standard in
`standard out
`
`The terms standard error, standard in, and standard out come from
`the C programming language and refer to sources or destinations of
`input or output from the program. Standard in is normally the user
`typing in commands; standard out and standard error are normally
`the screen that displays program output and error messages.
`
`In async serial communication, indicate the end of data.
`
`A striped set or striped disk is a form of RAID. Disk 1/0 is evenly
`spread over several disks, improving performance over using a single
`disk. A striped set is a group of disks being treated as a single unit for
`striping.
`
`stop bits
`
`striped
`
`sub/eey
`
`Child of a higher-level registry key, much in the same manner as the
`filesystem, where a subdirectory is a child of a parent directory.
`sabnet masle
`
`Tells computers which part of an IP address is the network number
`and which is the host number. This is essential for routing the packet
`to the right destination.
`
`Glossary 325
`
`/uessa/3
`
`18
`
`18
`
`
`
`TCP (Transmission Control Protocol)
`Connection—oriented protocol in the TCP/IP suite. It is used where reli-
`able, bidirectional communication is required.
`
`YFTP (Trivial File Transfer Protocol)
`Primitive file transfer protocol primarily used for downloading boot
`images. It is implemented in UDP and is unsuited for anything other
`than simple, LAN-based tasks.
`
`transport
`
`trigger
`
`Network protocol.
`
`Some event thatis being waited for. The Performance Monitor and
`Network Monitor tools both have the ability to perform some action if
`a certain condition is met. For example, Network Monitor could be set
`to page the administrator if it sees a certain type of network traffic.
`
`trigger action
`What should be done when the trigger event occurs.
`
`trust relationship
`Mechanism for allowing resources to be used by users from another
`domain who do not have accounts in the local domain.
`
`UDP (User Datagram Protocol)
`Connectionless protocol that runs on top of the IP protocol. It is used
`for name service, route advertisements and other services that do not
`need or want to avoid the overhead of a connection—oriented protocol
`such as TCP. It is part of the TCP/IP protocol suite.
`
`UNC (Universal Naming Convention)
`Composed of two backslashes, followed by a computer name, a single
`backslash and a share name, all of which uniquely describe a resource
`on the network. A UNC path may also contain directory name(s) and a
`file name. For example:
`\\NTSRV1\PUBLlC
`\\PRINTSRV\HP4MP
`
`the PUBLIC directory on NTSRV1
`the HP4MP printer on PRINTSRV
`
`volume
`
`Typically a disk or a subdirectory of a disk being shared on the net-
`work to other computers.
`
`VPN (Virtual Private Nettvorle)
`Constructed out of a shared or public network, such as the Internet. It
`looks like a dedicated or private connection to the computers using it,
`even though it may be traversing multiple other networks. VPNs can
`save money compared with leased private lines and offer security
`through encryption.
`
`WAN (Wide Area Netzvorle)
`Usually a point-to—point network link, such as a PPP session over an
`analog phone or ISDN line, or a dedicated connection using a 56k
`DDS, T1 or fractional T1.
`
`326 Glossary
`
`19
`
`19
`
`
`
`WINS (Windows Internet Name Server)
`Translates NetBIOS Computer names to IP addresses, allowing Micro-
`soft Networking to function over TCP/IP networks.
`
`X25
`
`XON/XOFF
`
`Protocol used on some packet—switched \X/ANS.
`
`Form of software flow control. The XOFF character suspends commu-
`nication and the XON character resumes it. This is no