throbber
5Q)- W
`
`
`
` .\ \
`
`:~-'."'»\» .)!~;i
`;,.a‘.a.»'.xl\‘..\";%\
`‘fiT1;;I5‘.‘§:‘:|$“.’::\‘.y‘Z\
` i\\\'\‘ I
`
`
`
`
`
`
`
`A Des/atop Qutc/e Reference
`for System Administrators
`
`Eric Pearce
`
`1
`
`APPLE 1025
`
`1
`
`APPLE 1025
`
`

`
`
`
`INDOS N
`
`A Desktop Qaic/e Reference
`for System Administrators
`
`by Eric Pearce
`
`Graphic interface mapping
`by Cloris Reilley and Beverly Murray Scberf
`
`O’RE|LLY"
`
`Cambridge
`
`~ Koln
`
`° Paris
`
`-
`
`Sebastopol
`
`~
`
`Tokyo
`
`
`
`2
`
`

`
`Windows NT in a Nutshell
`
`by Eric Pearce
`
`Copyright © 1997 O’Reilly 8: Associates, Inc. All rights reserved.
`Printed in the United States of America.
`
`Published by O’Reilly 8; Associates, Inc., 101 Morris Street, Sebastopol, CA 95472.
`
`Edif0I‘.' Robert Denn
`
`Production Editor: Nancy Wolfe Kotary
`
`Printing History:
`
`June 1997:
`
`First Edition.
`
`Nutshell Handbook and the Nutshell Handbook logo are registered trademarks and
`The Java Series is a trademark of O‘Rei1ly & Associates, Inc.
`
`Many of the designations used by manufacturers and sellers to distinguish their
`products are claimed as trademarks. Where those designations appear in this book,
`and O’Reilly 8: Associates, Inc. was aware of a trademark claim, the designations have
`been printed in caps or initial caps.
`
`While every precaution has been taken in the preparation of this book, the publisher
`assumes no responsibility for errors or omissions, or for damages resulting from the
`use of the information contained herein.
`
`3&9
`This book is printed on acid-free paper with 85% recycled content, 15% post—consumer
`Waste. O’Reilly & Associates is committed to using paper with the highest recycled
`content available consistent with high quality.
`
`ISBN: 1-56592-251-4
`
`[3/98]
`
`3
`
`

`
`
`
`E l i
`

`
`1
`
`Summary
`The Client Service for NetWare control panel allows the computer to accessfile
`and print services from the Novell NetWare server. The CSNW Control Panel
`assumes you have a previously installed and working Novell server to connect
`to and a valid username and account on the Novell server.
`
`
`S
`S
`if
`i
`- Tree
`I
`0 Usernume
`E
`- Context
`2
`0 Preferred Server
`~
`~
`' ~ r ~ ‘-
`0 Defuultlree and (ontext — 4
`O Print Options- 0 Add Form Feed
`I logln S(rlpt0 lions —-—-——l— R
`L
`I 5 r
`5 *
`0 Notify When Printed
`0 Overview (hep)
`E
`0 Prim Banner
`
`0 Selert Prelerred Server
`-(urrentPreterredServer
`
`i3
`
`V
`
`1
`
`Username
`
`Shows name of currently logged—on user. If the Windows NT password for this
`username is different from the password on the Net\X/are server, you will get a
`second login prompt while attaching to the Net\X/are server.
`Preferred Server
`
`Displays current preferred server for non—NDS (Net\X/are Directory Services)
`environments (such as Netware 3.x).
`
`Select Preferred Server [Preferred Sewer]
`The scroll list contains a list of NetWare servers discovered on the network. If
`
`the list is empty, there may be a communications problem between the local
`computer and the NetWare server.
`
`Check the Frame Type settings for the IPX Protocol in the Network control
`panel to see if they match those being used by the Net\X/are server; this should
`be visible from the net view /networ/e.-nw command. The rpxrozrte command is
`useful for learning the frame types in use on the network.
`Default Tree and Context
`
`Defines NDS name and position of your login username for NDS environments
`(Net\X/are 4.x).
`
`Run login Script [login Srript Options]
`Run login script when logging in to Net\X/are sewer.
`
`2
`
`3
`
`4
`
`5
`
`Devices
`
`Requires
`NT Workstation or Server
`
`Summary
`The Devices control panel shows the current status of device drivers, and
`allows you to stop and start them and to modify their startup behavior. Its pri-
`mary use is customizing hardware profiles and disabling installed hardware. A
`device driver must be loaded and running in order for a higher level service or
`program to use it. If you are creating a hardware profile, use the Devices con-
`trol panel to control how or if a device driver is started for the profile. If you
`
`.
`1
`
`.‘
`;
`
`I
`
`1
`‘
`
`*5
`
`.;
`
`8 C/oapter2— The Control Panel
`
`
`
`4
`
`

`
`
`
`I
`
`have hardware installed that you want to make unavailable, disabling the
`device driver for that hardware prevents the system from using it.
`
`Device
`
`1
`
`Devices
`Status
`5'0”
`Stop
`2
`Sturtup
`HW Profiles -— 3 E
`
`
`
`~
`
`Devire
`0 Deviie
`I
`0 Disable
`
`‘!
`
`2
`
`,
`Status
`If the Status field is blank, the device driver is not loaded.
`Sturtup
`There are five startup types:
`Boot
`
`Start upon system boot before other device drivers
`
`System
`Start upon system boot after Boot device drivers
`Automatic
`
`Start upon system boot after System device drivers
`Manual
`
`Start only when requested by system or user
`Disabled
`
`Start only when requested by system, unavailable to users
`HW Profiles
`
`3
`
`Enable or disable devices for a specific hardware profile. Changes will take
`effect only after the next reboot.
`
`Dial-Up Monitor
`
`Requires
`NT Workstation or Server
`Remote Access Server (RAS)
`
`Summary
`The Dial-Up Monitor control panel can be used to display various statistics
`about a Dial—Up Networking RAS session. It is normally used to monitor a PPP
`or SLIP session running over an analog phone line or ISDN line, but it can also
`monitor a PPTP session. Dial-Up Monitor may be useful when debugging
`errors that occur after a RAS session is successfully started, such as line errors
`or errors caused by insufficient system resources.
`
`Dial-Up Monitor 9
`
`
`
`5
`
`

`
` 3
`
`4
`
`HW Profiles
`Once you have a created a hardware profile using the System control panel,
`you can determine which services should be started when using the profile.
`For example, if you created two profiles for a laptop for office and home use,
`you could turn off most of the network services for the home profile. Remem-
`ber that the device drivers listed in the Devices control panel also have to be
`configured and running for the profile in order for the services to make use of
`them.
`
`Allow Service to Interact with Desktop [Siurtuplog 0nAs~System Account]
`Enable this option if the service needs to prompt a user for input. If the ser-
`vice tries to access the desktop for some reason (such as an error) and cannot,
`the service may hang or stop functioning.
`
`1
`1
`
`r
`
`5
`
`Sturtup Parameters
`If the service needs parameters when it is started, these can be entered here.
`The backslash character (\) is an escape character and must be protected by
`another backslash. For example,
`if you Wanted to pass the UNC name
`\\NTSRV1 to a service, it would have to be typed as \\\\NTSRV1.
`
`System
`
`Requires
`NT Workstation or Server
`
`Summary
`
`The System control panel is a catchall for settings and information that did not
`justify separate control panels. You can change environment variables, paging
`behavior, application priority, the startup menu, and create, copy, and delete
`hardware and user profiles.
`
`4‘
`
`i
`
`A
`
`52 Chapter 2 — The Control Panel
`
`6
`
`

`
`
`
`Pgrfofmumg
`W V
`
`Environment
`—«
`r
`
`5l‘"l“P/Sll”l‘l°Wfl l
`’
`“‘
`“"""’ "
`
`7 V
`
`Hardware
`Profiles
`_,
`
`General
`—
`
`—
`
`1
`
`~
`
`i-— ° System
`«F
`0 Registered to
`0 (omputer
`
`‘
`

`
`0 Appliration Performance
`Select the performance boost for the loreguund application
`- Roost
`llane/Maximum
`0 Virtual Memar
`Total paging hie size for all disk volumes
`(hange
`
`
`
`It
`
`_
`E
`E
`V
`
`§— - System Variables
`0 User Variables farx
`- Variable
`- Value
`I Set
`' llelele
`U M
`
`
`5
`
`.5y5r9msga.1up
`gram,
`Show llsi for x seconds
`6
`. Rewveyy
`Write an event to the system lag
`Send (allg1flml|ll$lffJfffV9 file”
`Write
`e u ging in ormation to
`Dverwrite aag existing file
`Automaticalh reboot
`
`l
`i
`

`l
`A
`
`Vl"”°l M°m°'Y
`0 Drive (Volume label)
`0 Paging file Size for Selected Drive
`Drive
`Space Available
`initial Size (MB)
`Maximum Size (MB)
`0 Total Paging file Size for All Drives
`Minimum Allowed
`Recommended
`CurrentlyAllocated
`' lle9l$lfY 5'10
`Current Registry Size
`M
`‘UY 910
`V WfWfmm‘“frN H
`
`‘
`
`
`
`0 Available Hardware Profiles
`° UP/DOW"
`I Properties
`C
`
`: Rl;$zm9
`' D
`l
`0 Mfrflidle Hardware Profiles
`Wait indefinitely for user selection
`Wait for user selection for x seconds
`soll?‘itlfilllfl!ll'T??'1‘?i‘l?_{Pf?l§5'i’PF?tor
`
`
`
`Copy Profile
`0 From
`ff:
`
`ll°'""“° Pmllle
`'¥!0m
`' 0
`’“"'”'“' ’”""
`
`
`
`'
`
`5
`
`
`'°P°’.l 9"
`General
`0
`
`8
`
`9
`
`i
`:
`
`
`
`5
`:
`
`local Group Membership
`. Mamba; of
`. Membm
`ll
`“Ml A“°"“l
`0 Find User or Group
`- Searrhh N
`Searc A
`Search Only in
`Searrb Results
`Add
`
`(onliguration
`
`S°_'l",l ll‘"“l’°'
`llfi: '5d“ il’(‘_"l°l’l°r‘°_"iP”Il(9'
`“I: urn lflfleillus
`"ow"
`Thetomrllutelisvndotked
`
`5 Network
`0 Select this check box to disable all
`networkdevicesfor thishardwareprofile
`Clear this check box to re-enable a I
`network devices for this hardware profile.
`Network-disabledhardwareprofile
`
`
`
`Change Type
`0 Prolile Type
`ll
`l°<°l Pi°lll°
`12 .
`Roaming profile
`Use cached profile on slow connections
`..
`,_
`. ., ,
`Choose User
`0 list Names From
`0 Names
`0 Alrlld
`U
`0 S aw sers
`- Members
`0
`ame
`0
`
`.
`.
`_
`User Profiles
`l0 E—- ‘ |l;tiil|l€$Sl0i9il 0“llili ¢°"iPUl9i
`° 9 Pl?
`‘""""""vfi“
`‘ (l|0"U° fYP°
`W”
`
`
`
`V
`
`?
`l
`
`.
`
`(apy To
`0 (opy profile to
`Browse
`0 Peilmitted to use
`E ange
`“
`
`i3
`
`14
`" s’ ' *
`
`General
`
`
`
`Displays information about this computer. This would have been a great place
`to indicate whether the system was running Workstation or Server and what
`service packs are applied. (Service pack information is available in Version tab
`of Windows NT Diagnostics and the Help-About Windows NT menu item on
`most tools and control panels.)
`
`ir
`
`l
`
`System 53
`
`7
`
`

`
` 2
`
`Boos! [Performance]
`Change the priority of the foreground application. You may want to move the
`slider bar to None for servers that are not being used from the console.
`
`
`
`3
`
`4
`
`3.“:
`
`Change [Perlormanre~Virrual Memory]
`Windows NT uses virtual memory, which allows the memory available to
`processes to be larger than the amount of physical memory (RAM) installed in
`the computer. Memory being used by inactive processes is paged out (stored
`on disk) to make room in the physical memory for active processes. The size
`and location of the paging file can affect system performance. For example, if
`you have several drives with different speeds, putting the page file on the
`fastest drive improves performance. Spreading the page file across several
`drives improves performance by distributing disk I/O.
`
`System Variables [Environment]
`Variables are used by the system and users to locate files and set various
`parameters at run time. For example, if you want to add a command in a new
`directory, you need to add the directory to the Path variable in order for the
`system to find the command. All the directories in the Path variable are
`searched in order when you are using the command line or the Start-Run
`menu. Changes take effect the next time an application is started.
`
`System Slarlup [Starrup/Shutdown]
`the startup menu (read from
`When using a dual- or multiple—boot system,
`BOOTJNI) selects which operating system to boot. You can change the default
`operating system or timeout.
`
`6
`
`Recovery [Slartup/Shutdown]
`If an NT application crashes, you can tell the system to record the event or
`create debugging information.
`7 Hardware Profiles
`
`Hardware profiles are a Way to manage different hardware configurations. The
`classic example is the laptop computer that needs different PC Cards to func-
`tion depending on where it is being used. For example, it needs an Ethernet
`card when connected to a LAN, and a modem card when not connected to the
`LAN. A computer using hardware profiles presents you with a menu before
`booting NT (and before any Startup BOOT.INI menu). Once you have created
`a hardware profile using the System control panel, the Devices and Services
`control panels are used to customize which device drivers are loaded and
`which services are started for the specific profile.
`
`8 General [Hardware Profi|esvProperfies]
`Some laptops have a dock to plug into at a fixed location such as an office.
`The docking unit usually contains network interfaces or other features that are
`not required when the laptop is in an undocked state.
`
`9 Network [Hardware Profiles-Properties]
`As one of the most common uses of hardware profiles to switch between net-
`work and non-networked settings, this setting will turn off all network devices
`for the non-networked profile.
`
`.
`'
`
`*
`
`,
`j
`
`r
`
`.
`l
`
`54 Claapter2— The Control Pcmel
`
`
`
`8
`
`

`
`: E
`
`/sued [wrung
`
`
`
`lil
`
`User Profiles
`
`User profiles keep track of personal settings, such as the appearance of the
`Desktop and Start menu contents. You can set up multiple users with the same
`settings by copying user profiles from one user account to another.
`
`local profile [User Proliles-Change TypeProlile Type]
`A local profile is associated with a specific computer.
`
`Roaming profile [User Profiles-Change lypeProfile Type]
`A roaming profile follows users regardless of what computer they are using.
`
`Copy prolile to [User Profilestopy [0]
`Copy the selected profile to a new location.
`
`Permitted to use [User Profiles-Copy To]
`Control which user or group can use the profile.
`
`ll
`
`l2
`
`l3
`
`l4
`
`Tape Devices
`
`Requires
`NT Workstation or Server
`
`Summary
`
`The Tape Device control panel installs, configures, or removes tape devices
`from the local computer. This includes SCSI, IDE, floppy, and parallel port
`drives.
`'
`
`If you are adding new hardware, the Resources tab of the Windows NT Diag-
`nostics tool is a good place to look for system—wide resource settings. Carefully
`choose the new settings to avoid conflicts with existing hardware.
`
`Tape Devires
`
`
`Devices
`~ ~-=-/-~ is
`
`1
`
`~
`
`Drivers
`-
`—-
`
`-lope deviresure lisied
`' Properties ifoniexr Sensitive)
`0 Deleri
`
`2
`
`V
`
`D
`
`D
`
`H
`
`D
`
`D
`
`D
`
`3 i—_ 0 lnsiulled drivers are listed
`v — ~
`0 Add
`0 Remove
`
`_
`
`l
`
`lnslall Driver
`
`- Munulariurers
`0 Tape Devires
`° Have Disk
`
`l
`
`Devices
`
`Displays a list of all detected tape devices.
`
`Detect [Devices]
`
`r
`
`If you have just installed new tape hardware, the Detect button tells the sys-
`tem to try to find it and load the appropriate driver.
`Drivers
`
`Displays a list of all tape device drivers being used.
`
`Tape Devices 55
`
`9
`
`

`
`
`
`tn
`
`'5U)
`
`S
`
`Glossary
`
`ACL (Access Control List)
`
`Contains all permissions information for a file, directory. This is similar
`to the DACL that controls access to registry keys.
`
`adapter
`
`answerfile
`
`AppleTal/e
`
`Usually, the network adapter card that connects a computer to a LAN.
`A display adapter is a video card that drives the computer monitor.
`
`Read by programs in place of keyboard input. They are most com-
`monly used to configure the operating system during unattended
`installation.
`
`Native network protocol of Apple Macintoshes.
`
`ARP (Address Resolution Protocol)
`
`Allows a computer running TCP/IP to find the MAC-level address for a
`given IP address.
`
`auditing
`
`Process of recording security—related events such as file access and
`user logons. System administrators can use audit information to track
`resource usage, discover break—in attempts, and debug security prob-
`lems.
`‘
`
`authentication
`
`Process of verifying that a computer or user actually is who they are
`claiming to be.
`
`BDC (Backup Domain Controller)
`Provides some fault tolerance and load distribution for the NT domain
`system. It can reduce the load on a PDC or take over from a failed
`PDC.
`
`517
`
`10
`
`10
`
`

`
`
`
`;
`
`l
`
`3
`
`5s
`
`i llii
`
`i
`
`binary value
`A base~2 number, which is either a 0 or 1.
`
`bindings
`
`Association of a network protocol and service with a specific network
`interface.
`
`BIOS (Basic Inpm‘/Output System)
`Very low—level program that interacts directly with the PC hardware.
`You may have to change BIOS settings to enable slots on the mother-
`board, cache memory and so on.
`
`v
`
`bridge
`
`buffer
`
`bus
`
`cache
`
`callback
`
`capture
`
`Connects two networks at the MAC—leVel, forwarding traffic from one
`to the other. It works with any network protocol, as it does not exam-
`ine the packets at the protocol level. Most bridges are smart enough to
`know which computers are each side of the bridge and only transmit
`traffic if it needs to go from one side of the bridge to the other. Broad—
`casts are propagated by bridges.
`
`I
`Unit of memory storage. Number or size of the buffers determines the
`amount of available storage.
`
`Shared communications path. For example: SCSI bus, PCI bus, and ISA
`bus.
`
`Unit of memory dedicated to holding recently used information in the
`hope that it will be used again, therefore increasing performance as
`opposed to reading or writing to disk.
`
`In RAS, the ability of a remote userto call a RAS server and have the
`RAS server hang up and call them back. This can be used to reverse
`call charges or enhance security.
`
`To read the network traffic from an interface using a tool such as Net-
`work Monitor.
`
`CHAP (Challenge Hcmdslaalee Autberrfication Protocol)
`One of the authentication protocols used by PPP to authenticate a con-
`nection. It encrypts the password before sending it over the connec-
`tion, preventing it from being intercepted in clear text.
`
`client
`
`It is one of the
`Program or computer making a request of a server.
`most over-used words in computing and has to be evaluated in the
`context that it is used.
`
`318 Glossary
`
`11
`
`11
`
`

`
`3‘<
`
`m '
`
`E«'4
`
`DACL (Discretionary Access Control List)
`Allows a selected list of users and groups to perform some action. For
`example, registry keys in the Windows NT Registry can be assigned
`DACLs, enabling some users to edit them and blocking others.
`
`databtts
`
`Number of bits that represent actual data, as opposed to signaling bits,
`such as stop, start, and parity bits. Usually used when talking about
`asynchronous serial communications, such as RS252.
`
`DDE (Dynamic Data Exchange)
`Microsoft Windows applications use DDE to exchange data. DDE
`enables data to be linked and simultaneously changed in all applica-
`tions.
`
`default gateway
`Router where all traffic to unknown networks is sent.
`
`default router
`See default gateway.
`
`DHCP (Dynamic Host Configuration Protocol)
`Protocol used to make TCP/IP plug—and—play. A computer that wishes
`to use TCP/IP broadcasts for a DHCP server. The DHCP server
`responds with a TCP/IP configuration for the client.
`
`DLC (Data Ltnle Control)
`Protocol used by NT to communicate with IBM mainframes and HP
`printers.
`
`domain, NTsecurtty
`Group of computers that share a common security scheme. All user-
`names, group names, and computer names are unique within the
`domain.
`
`clomatn, TCP/1P
`
`Defines an organization within the Domain Name System (DNS). For
`example, orez'lly.com.
`
`DSN (Data Source Name)
`
`Describes an ODBC database. Database clients wishing to interact with
`the database address the database by its DSN.
`
`DUN (Dz'al—Up Networking)
`Client side of RAS. It enables a Windows NT Workstation or Server to
`dial out to another computer or the Internet.
`'
`
`DW/ORD
`
`Data type used within Win32 programming. It also appears as a data
`type within the Registry. It is displayed as four bytes of hexadecimal
`data.
`
`enterprise serz/er
`
`NT Server that manages a resource (such as licensing) for an entire
`enterprise.
`
`Glossary 319
`
`
`
`12
`
`12
`
`

`
`ERD (Emergency Repair Disle)
`Floppy disk that contains enough information to recover an NT system
`if critical system files are damaged.
`
`1
`
`FAT(File Allocation Table)
`Original DOS filesystem.
`
`file locle
`
`Mechanism to prevent simultaneous writes occurring on the same file.
`The file is “locked”, preventing anyone except the first person who
`opens it from writing to it.
`
`FPN W (File and Print Servicesfor Netll’/are
`Enables an NT Server to act like a Novell NetWare file server and offer
`Net\X/are file and print services to Net\X/are clients.
`
`frame
`
`Single network packet. The term frame is usually used to describe a
`low-level packet type, such as Ethernet and PPP.
`
`F7? (File Transfer Protocol)
`Protocol used by the program of the same name to transfer files over
`TCP/IP.
`
`globbing
`
`Gopher
`
`Wildcard mechanism for matching filenames. For example, “?” matches
`any single character within a filename and “*” matches zero or more
`characters.
`
`Predecessor of HTTP. It provided a menu—driven interface to text and
`graphic information.
`
`GSNW (Gateway Servicefor Netu’/are)
`Allows an NT Server to connect to a Novell Net\X/are server and redis-
`
`tribute Net\X/are file and print resources to Microsoft Networking cli-
`ents.
`
`GUI (Graphical User Interface)
`Windowing system front end to an operating system, such as Windows
`NT and Windows95. Also called a “shell” in some cases.
`
`biz/e
`
`Tree of registry data stored in separate disk file.
`
`HTTP (Hyper-Text Transfer Protocol)
`Protocol used by the World-Wide-Web.
`
`ICMP (Internet Control Message Protocol)
`Maintenance protocol in the TCP/IP protocol suite. Used by the com-
`mands ping and tracert to find and isolate network problems.
`
`IDE (Integrated Drive Electronics)
`Very common and inexpensive disk and CD—ROM interface.
`
`IP (Internet Protocol)
`Native protocol of the Internet, and part of the TCP/IP protocol suite.
`
`320 Glossary
`
`
`
`13
`
`13
`
`

`
`
`
`
`IPX/SPX (Internet Packet Exchange/Sequenced Packet Exchange)
`Used by Novell NetWare to provide datagram and stream—oriented net-
`work services (analogous to UDP and TCP in TCP/IP).
`
`
`
`/f.lE$S0]_l]
`
`ISDN (Integrated Service Digital Network)
`Digital phone line that offers a data rate of 128 Kbps in its most com-
`mon form.
`
`LAN (Local Area Nelworle)
`Group of network devices communicating using Ethernet, token—ring,
`or FDDI within a small area, such as a building or campus.
`
`LCP (Lin/e Control Protocol)
`Subprotocol of PPP used to negotiate PPP options between the PPP
`client and server.
`
`; !
`
`LPD (Line Printer Daemon)
`Protocol and UNIX service for transferring print jobs between TCP/IP
`computers (or networked printers).
`
`MAC‘ (Media Access Control)
`‘
`The MAC layer of networking is the Ethernet or token-ring level, and
`deals with low-level issues such as access and collision detection. A
`
`MAC—level address is usually an Ethernet address. Bridges function at
`the MAC layer and do not decode frames farther than the MAC layer.
`
`migration
`
`mirroring
`
`Process of moving from one operating system to another or from one
`version of an operating system to another.
`
`RAID feature that copies all 1/0 for one disk drive to another, essen-
`tially keeping an online backup.
`
`MS—CHAP (Mlcrosofi‘. CHAP)
`Microsoft-specific version of the Challenge Handshake Authentication
`Protocol (CHAP), which is used to authenticate RAS PPP sessions.
`
`multiboined
`
`A multihomed computer has either multiple IP addresses for a single
`network interface or multiple network interfaces. Web sewers are fre-
`quently multihomed, which allows the web server to serve different
`web content depending on which interface or IP address a client con-
`nects to.
`
`nameseruer, DNS
`Server that accesses the Domain Name system of networked databases
`that converts hostnames to IP addresses and IP addresses to host-
`names.
`
`rzameseruer, NetBIOS
`
`translates NetB1OS computer names to IP
`Usually a WINS server;
`addresses, allowing Microsoft Networking to take place over TCP/IP
`networks.
`
`
`
`Glossary 321
`
`14
`
`14
`
`

`
`NetBEUI (NetBIOS Extended User Interface)
`Non-routable protocol used on small LANs. It is the default networking
`protocol of Windows for Workgroups and Windows 95.
`
`NetBIOS (Networle Basic Input‘/Output System)
`API for Microsoft Networking applications.
`
`NNYP (Network News Transfer Protocol)
`Internet standard for transferring Usenet news articles between com-
`puters.
`
`node type
`
`NYFS
`
`Indicates the NetBIOS name resolution mechanism in use (broadcast
`only, p0int—to—point only, broadcast
`first, point-to—point second, or
`point—to—point first, broadcast second)
`
`Windows NT filesystem.
`
`NVRAM (Non—z)olatile RAM)
`RAM used to store BIOS settings, even with the power off.
`
`ODBC (Open Database Connectivinl)
`Microsoft database interoperability standard that allows ODBC-compli-
`ant applications to connect to ODBC—cornpliant databases.
`
`PAD (Pacleet Assembler/Disassembler)
`Communications device that connects a computer to a packet network;
`such as X.25.
`
`PAP (Password Authentication Protocol)
`PPP authentication protocol. It is a simple exchange of username and
`passwords between client and server.
`
`parity
`
`PC Card
`
`Extra bit (or bits) added to data in serial communications as a form of
`error detection.
`
`New name for the PCMCIA interface. Originally intended for memory
`expansion, the interface is now most commonly used for modern and
`network cards.
`
`PCL (Printer Control Language)
`Hewlett—Packard’s printer language.
`
`PCMCIA (Personal Computer Memory Card International Association)
`Old name for the PC Card interface.
`
`PDC (Primary Domain Controller)
`NT server that controls the security relationship for an NT domain.
`
`port number
`Identifies a specific endpoint of a TCP or UDP connection, which is
`usually a service running on a network device.
`
`
`
`322 Glossary
`
`
`
`15
`
`15
`
`

`
`POSIX (Portable Operating System Interface)
`Set of standards for APIs that are intended to make porting UNIX
`applications easier.
`
`PPP (Pomt—to—Pomt Protocol)
`Standard protocol for creating a network connection across a serial
`line.
`
`PPYP (Point-to-Point Tzmneling Protocol)
`Protocol used to create tunnels across intermediate networks, which
`can be encrypted and carry non-native protocols.
`
`Profile, laczrdzuczre
`Set of device driver and service settings that are associated with the
`presence of specific hardware. A laptop can use a hardware profile to
`disable the network when no network is available.
`
`Profile, Remoteboot
`Combination of operating system type and network adaptor type used
`to boot a computer using the Remoteboot service.
`
`Profile, user
`Collection of personal GUI preferences and settings that is stored on a
`server. This enables a user to log on from different computers and
`always download the same customization settings.
`
`propagation
`Process of transmitting data received from one source to another.
`
`protocol
`
`proxy
`
`Set of standards for network communication.
`
`One computer acting on another computer’s behalf. A WINS proxy
`receives WINS requests and forwards them to a WINS server.
`
`pus/9/pztllparmer
`In WINS, servers that can exchange computer names and addresses.‘
`
`RAID (RedtmdcmtArray ofInexpensive Dis/es)
`Technologies for combining multiple disk drives into a larger virtual
`drive to improve performance or enable fault tolerance.
`
`RAS (Remote Access Service)
`Windows NT facility for creating dialup network connections to other
`computers or the Internet.
`
`~
`Small amounts of NVRAM that store configuration settings on modems.
`
`registers
`
`Registry
`
`Hierarchical database for NT system information.
`
`/{Jessa/9
`
`Glossary 323
`
`16
`
`16
`
`

`
`
`
`registry key
`
`replication
`
`Analogous to a directory in a filesystem. Keys contain subkeys and
`Values.
`
`Process of copying data to different machines, usually with the require-
`ment that it is to be kept consistent everywhere.
`
`RFC (Request For Com.mem‘5)
`Technical document that describes a protocol or standard used on the
`Internet.
`
`RIP (Rowing I7y’ormatz‘on Protocol)
`Most common TCP/IP routing protocol used on small to medium net-
`works.
`
`roclmmg profile
`Profile that follows a user around, allowing him or her to log on from
`different computers and always get the same settings.
`
`rozlter
`
`Routes packets based on destination address.
`propagate broadcasts.
`
`It
`
`typically does not
`
`RTS/CTS (Request To Sena’/Clem‘ To Send)
`Form of hardware flow control used in serial communications.
`
`It
`
`is
`
`typically used on high-speed devices that support the necessary signal-
`ing leads.
`
`SAP (Service Adverflsmg Protocol)
`Microsoft,Netw0rking uses SAP to advertise the availability of shared
`resources, such as files and printers.
`
`sccwengmg
`
`Checking the consistency of a database.
`
`scope, DHCP
`Typically a subnet (defined by a subnet mask) of IP addresses that are
`to be handed out to DHCP clients.
`
`scope, NetBIOS
`Means of grouping computers on the network. Only computers with
`the same scope ID can communicate.
`
`SCSI (Small Computer System Interface)
`Interface standard for disks, tapes, and CD-ROMS. It is usually more
`expensive than IDE, but offers more devices and higher performance.
`
`server
`
`service
`
`Program or computer answering the requests of a client.
`
`Program running on NT that provides some service to the operating
`system, user, or remote computer. Services typically start at boot time
`and run until the computer is shut down.
`
`324 Glossary
`
`17
`
`17
`
`

`
`
`
`seruicepac/e
`
`Microsoft releases a service pack for Windows NT when enough
`bug fixes and features have accumulated after a major release of the
`operating system.
`
`SLIP (Serial Line IP)
`
`Older method of creating a network across a serial line.
`largely supplanted by PPP.
`
`It has been
`
`SMB (Server Message Bloc/e)
`Protocol used for file sharing in Microsoft Networking.
`
`SM77’ (Simple Mail Transport Protocol)
`Defacto standard for exchanging electronic mail on the Internet.
`
`SMS (System Management Server)
`Part of the Microsoft Backoffice suite. It is intended to make manage-
`ment of large numbers of computers easier. It includes the full—featured
`version of the Network Monitor tool.
`
`SNMP (Simple Networle Management Protocol)
`Protocol used by network devices to inform a network management
`console about the status of the network.
`
`SPAP (Sb tz/a Password Authentication Protocol)
`Modified version of the PAP authentication protocol that improves on
`regular PAP by encrypting the password before sending it over the
`PPP connection.
`
`standard error
`standard in
`standard out
`
`The terms standard error, standard in, and standard out come from
`the C programming language and refer to sources or destinations of
`input or output from the program. Standard in is normally the user
`typing in commands; standard out and standard error are normally
`the screen that displays program output and error messages.
`
`In async serial communication, indicate the end of data.
`
`A striped set or striped disk is a form of RAID. Disk 1/0 is evenly
`spread over several disks, improving performance over using a single
`disk. A striped set is a group of disks being treated as a single unit for
`striping.
`
`stop bits
`
`striped
`
`sub/eey
`
`Child of a higher-level registry key, much in the same manner as the
`filesystem, where a subdirectory is a child of a parent directory.
`sabnet masle
`
`Tells computers which part of an IP address is the network number
`and which is the host number. This is essential for routing the packet
`to the right destination.
`
`Glossary 325
`
`/uessa/3
`
`18
`
`18
`
`

`
`TCP (Transmission Control Protocol)
`Connection—oriented protocol in the TCP/IP suite. It is used where reli-
`able, bidirectional communication is required.
`
`YFTP (Trivial File Transfer Protocol)
`Primitive file transfer protocol primarily used for downloading boot
`images. It is implemented in UDP and is unsuited for anything other
`than simple, LAN-based tasks.
`
`transport
`
`trigger
`
`Network protocol.
`
`Some event thatis being waited for. The Performance Monitor and
`Network Monitor tools both have the ability to perform some action if
`a certain condition is met. For example, Network Monitor could be set
`to page the administrator if it sees a certain type of network traffic.
`
`trigger action
`What should be done when the trigger event occurs.
`
`trust relationship
`Mechanism for allowing resources to be used by users from another
`domain who do not have accounts in the local domain.
`
`UDP (User Datagram Protocol)
`Connectionless protocol that runs on top of the IP protocol. It is used
`for name service, route advertisements and other services that do not
`need or want to avoid the overhead of a connection—oriented protocol
`such as TCP. It is part of the TCP/IP protocol suite.
`
`UNC (Universal Naming Convention)
`Composed of two backslashes, followed by a computer name, a single
`backslash and a share name, all of which uniquely describe a resource
`on the network. A UNC path may also contain directory name(s) and a
`file name. For example:
`\\NTSRV1\PUBLlC
`\\PRINTSRV\HP4MP
`
`the PUBLIC directory on NTSRV1
`the HP4MP printer on PRINTSRV
`
`volume
`
`Typically a disk or a subdirectory of a disk being shared on the net-
`work to other computers.
`
`VPN (Virtual Private Nettvorle)
`Constructed out of a shared or public network, such as the Internet. It
`looks like a dedicated or private connection to the computers using it,
`even though it may be traversing multiple other networks. VPNs can
`save money compared with leased private lines and offer security
`through encryption.
`
`WAN (Wide Area Netzvorle)
`Usually a point-to—point network link, such as a PPP session over an
`analog phone or ISDN line, or a dedicated connection using a 56k
`DDS, T1 or fractional T1.
`
`326 Glossary
`
`19
`
`19
`
`

`
`WINS (Windows Internet Name Server)
`Translates NetBIOS Computer names to IP addresses, allowing Micro-
`soft Networking to function over TCP/IP networks.
`
`X25
`
`XON/XOFF
`
`Protocol used on some packet—switched \X/ANS.
`
`Form of software flow control. The XOFF character suspends commu-
`nication and the XON character resumes it. This is no

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket