Space


Glossary

A B C D E F G H I L M N O P R S T U V W

This glossary defines some of the terms found in the documentation for Microsoft Proxy Server. Click a letter (above) to jump to that section of the glossary, or use your browser’s Find command to search for a word across the entire glossary. For example, if you are running Microsoft Internet Explorer, from the Edit menu click Find and type in the word you are looking for.


To TopA

Access Control Entry (ACE)

An entry in an access control list (ACL) that specifies access rights for specific files and shares within Windows NT File System (NTFS) directories.

Access Control List (ACL)

A listing of Access Control Entries specifying access rights to services and specified data files located within Windows NT File System (NTFS) directories.

active caching

A service mechanism used to initiate new requests to update cached file objects. Requests can be activated based on the length of time an object has been cached or was last retrieved from the object’s source location. This type of caching can be used to assure the freshness of specified data within the cache. See also fresh data, stale data.

annotation file

For the FTP service, a summary of the information in a given directory. This summary appears automatically to browsers.

anonymous logon

This feature allows remote access to an Internet server computer. Remote users can connect to the computer without supplying a user name or password, but have only the guest permissions assigned to this account.

associating

See file-name extension mapping.

authentication

A process used to determine if a user has permission to access a resource or perform an operation.


To TopB

Backup Domain Controller (BDC)

A domain server used to replicate the master database for the domain. The master database contains centralized security data for all domain-assigned users and is updated when changes in security are made. See also Primary Domain Controller (PDC), member server.

bandwidth control

Setting the maximum capacity that a service is allowed to use. You can deliberately limit a server’s Internet workload by not allowing it to receive requests at full capacity, saving resources for other programs such as e-mail.

basic, clear-text authentication

An authentication protocol supported by Internet Explorer. There is no encryption with this protocol.

BDC

See Backup Domain Controller (BDC).

BIND

See Domain Name System (DNS).

bits per second (bps)

The measure of speed at which data is transferred over a network.

bps

See bits per second (bps).

browser

A tool for navigating and accessing information on either the Internet or an intranet.


To TopC

cache

A store of files from a Web server copied locally for quicker access. Caching is configured for Web clients by selecting the View menu in Internet Explorer and choosing Cache Settings.

cache consistency

The degree to which cached data remains accurate in comparison to source information.
See also Intelligent TTL (Time-to-Live), object modification checking.

CERN-proxy protocol

An accepted industry protocol standard for application-aware proxy services over HTTP-based client/server communications. The CERN standards are established by the Conseil Europeén pour la Recherche Nucléaire (European Laboratory for Particle Physics), located in Switzerland.

CGI

See Common Gateway Interface (CGI).

challenge/response

See Windows NT Challenge/Response Authentication.

client/server architecture

The structure of services that run on the Internet or an intranet. The client computer accesses the Web server, which supplies the client with resources or information not found on the client’s own host. Also, CGI and ISAPI applications can do processing on the Web server and return results to the client.

commit rate

Refers to the speed with which objects or URLs are added to the cache.

Common Gateway Interface (CGI)

An interface used by an application that runs on a Web server when a client requests it.

connected service

Refers to a service that provides a managed connection allowing networked computers to communicate reliably. TCP and SPX protocols support this type of service. Features of this type of service include the following: data integrity checking, packet sequencing, and error correction. Also known as “streamed” service.

connectionless service

Refers to those network communications which emphasize broadcast methods and unacknowledged delivery. UDP is a protocol that supports this type of service. Supports higher throughput speeds for real-time applications. See also User Datagram Protocol (UDP).

cookie

A customized or personalized HTML document page that is assembled and returned by a Web server, based on information sent by the client .

cryptography

A method of securing data transmissions to and from an Internet server.

C2-compliant

A high-level security rating established and granted by the U.S. government.


To TopD

daemon

Originally, a UNIX term used to describe a program that loads and waits continuously in the background for a request before executing. When a request is received, the program operates in the foreground, and once it has completed an execution, returns to the background and awaits further requests.

data integrity

A way of preventing data from being altered in transit.

Data Source Name (DSN)

The name that allows a connection to an ODBC data source, such as an SQL database. You set this name by using the ODBC application in Control Panel.

DHCP

See Dynamic Host Configuration Protocol (DHCP).

DNS

See Domain Name System (DNS).

DNS spoofing

Assuming the DNS name of another system by either corrupting a name-service cache, or by compromising a domain-name server for a valid domain.

domain

For Windows NT Server, this is a collection of computers that share a common centralized domain database that administers access and establishes security policies. For the Internet, domains can also refer to a style of addressing on the Internet that uses the Domain Name System (DNS) to provide conventional names for Internet computers that can be mapped to IP addresses.

domain controller

For a Windows NT Server domain, the server that authenticates domain logons and maintains the security policy and the master database for a domain. See also Backup Domain Controller (BDC), member server, Primary Domain Controller (PDC).

domain filtering

The ability to control access to specific Internet sites by denying or granting permission to access those sites.

Domain Name System (DNS)

A protocol and naming system used throughout the Internet to map Internet Protocol (IP) addresses to user-friendly names. DNS is sometimes referred to as the BIND service.

DSN

See Data Source Name (DSN).

Dynamic Host Configuration Protocol (DHCP)

An industry-standard protocol that assigns Internet Protocol (IP) addresses to computers for temporary connected use on an IP network.


To TopE

encryption

A way of making data indecipherable while it is being sent from computer to computer.


To TopF

file-name extension mapping

Connecting all files with a certain file name extension to a program. For example, through the Windows NT Explorer, all .txt files are associated by default with Notepad. In Internet Explorer, you can associate file name extensions with applications by use of the Helpers dialog box. To display this dialog box, from the View Menu, choose Helpers.

File Transfer Protocol (FTP)

A TCP/IP-based standard protocol for sharing files between computers.

filter

A feature of ISAPI that allows pre-processing of requests and post-processing of responses, permitting site-specific handling of Hyper-Text Transfer Protocol (HTTP) requests and responses.

firewall

A system, or combination of systems, that enforces a boundary between two or more networks and keeps intruders out of private networks.

fresh data

Cached data that is verified to be current and consistent with its source. See also cache consistency, stale data.

friendly name

A name that substitutes for an IP address, for example, www.microsoft.com instead of an IP address such as 157.45.60.81.

FTP

See File Transfer Protocol (FTP).


To TopG

garbage collection

The process of removing unused or outdated object data from the cache.

gateway

A hardware or software device that directs network traffic between two separated networks. For example, Microsoft Proxy Server can act as a gateway between a private network (an intranet) and the public network (the Internet).

Gopher

 A hierarchical system for finding and retrieving information from the Internet or an intranet.

Gopher Plus

An enhanced version of Gopher, including a way of getting more information about an item (such as file size, last date of modification, and the administrator’s name); the ability to display a single file in multiple formats (such as regular text, rich text, and PostScript); a way to add a short description of the item; and the ability to ask a user to fill out a form to obtain an item.

Gopherspace

All files available on a Gopher server for display by using the Gopher protocol.


To TopH

header

In packet-level communications, a specified number of bytes that precedes the actual data being transmitted. It identifies control information used to deliver, route and process the data contents of a packet.

hit rate

The percentage of client requests fulfilled through previously cached data, in contrast to the total of all client requests that have been processed by the caching service.

home directory

The root directory for a service, where the content files are stored. By default, the home directory and all its subdirectories are available to users.

HTML

See Hypertext Markup Language (HTML).

HTTP

See Hypertext Transfer Protocol (HTTP).

HTTPD server

Another name for a Web server, which uses HTTP for its primary means of communicating with clients and operates as a daemon-type process. See also daemon, Hypertext Transfer Protocol (HTTP).

hyperlink

A way of jumping to another place on the Internet. Hyperlinks usually appear in a different format from regular text. You initiate the jump to a new link by clicking the link.

hypertext

Documents with links to other documents. Click a link to display the linked document.

Hypertext Markup Language (HTML)

The formatting language used for documents on the World Wide Web.

Hypertext Transfer Protocol (HTTP)

The underlying protocol by which WWW clients and servers communicate.


To TopI

IIS

See Internet Information Server (IIS).

Integrated Services Digital Network (ISDN)

A connection to the Internet installed by your Internet service provider (ISP). A dial-up ISDN line can offer speeds up to 128,000 bps.

Intelligent TTL (Time-to-Live)

A method for optimizing caching service that extends cache life for those cache objects which are frequently requested. Each time an object is retrieved from the cache, this function sets a new increased TTL expiration value for the object based on a percentage of the object’s remaining TTL within the cache.

interactive applications

A program written in C, Perl, or as a Windows NT batch file. The user initiates the program by clicking a hyperlink.

Internet

The global network of computers that communicate through a common set of protocols known collectively as TCP/IP. See also Transmission Control Protocol/Internet Protocol (TCP/IP).

Internet Information Server (IIS)

The Microsoft Internet server product designed for implementing and managing content sites for TCP/IP-based networks and client access. Microsoft Proxy Server integrates fully with IIS and Microsoft Windows NT Server.

Internet Network Information Center (InterNIC)

The agency that centrally coordinates assignment and registration of DNS names and IP addresses for use on the Internet. See also Domain Name System (DNS), Internet Protocol (IP) address.

Internet Protocol (IP)

The routing protocol part of TCP/IP that uses IP addressing to route messages from one Internet location to another. See also Internet Protocol (IP) address.

Internet Protocol (IP) address

A unique address that identifies a host on a network. It identifies a computer as a 32-bit address that is unique across a TCP/IP network. An IP address is usually represented in dotted-decimal notation, which depicts each octet (eight bits, or one byte) of an IP address as its decimal value and separates each octet with a period, for example: 102.54.94.97.

Internet Relay Chat (IRC)

A protocol that supports interactive text-based communications in established “chat room” sites on the Internet.

Internet Server Application Programming Interface (ISAPI)

A Microsoft-developed specification for establishing procedural calls between Internet-based applications and the underlying operating system.

Internet Service Providers (ISPs)

Public providers of remote connections to the Internet.

InterNIC

See Internet Network Information Center (InterNIC).

Internetwork Packet Exchange (IPX)

A routing protocol developed for Novell networks that is used in place of the Internet Protocol (IP) to manage communications access between network devices.

intranet

Any privately operated TCP/IP-based network (for example, a corporate network). Intranets can be connected to the Internet, but are usually protected by an intermediate set of barrier devices that secure Internet access. See also firewall.

IP

See Internet Protocol (IP).

IP address

See Internet Protocol (IP) address.

IPX/SPX

See Internetwork Packet Exchange (IPX), Sequenced Packet Exchange (SPX).

ISAPI

See Internet Server Application Programming Interface (ISAPI).

ISDN

See Integrated Services Digital Network (ISDN).

IUSR_computername

A default account with anonymous logon privileges for accessing Internet-based services, such as FTP, WWW, and Gopher. This account is created during Microsoft Internet Information Server installation.

 


To TopL

LAN

See Local Area Network (LAN).

LAT

See Local Address Table (LAT).

leased line

A high-capacity line (most often a telephone line) dedicated to network connections.

Least Recently Used (LRU)

Refers to the concept of discarding cached data on the basis of frequency of use.

link

See hyperlink.

LMHOSTS file

A text-based file that is used as a static routing table in Microsoft Windows NT Server to authenticate and register valid IP addresses and associated user-friendly domain names for IP nodes in a local TCP/IP network.

Local Area Network (LAN)

A group of computers that are linked together around a shared site and unified purpose.

Local Address Table (LAT)

A table of all internal IP address pairs on the private network where Microsoft Proxy Server is installed. This list is used to control access between clients on the internal network and remote IP addresses on external IP networks (or the Internet). The LAT is registered and stored in a text-based file (Msplat.txt) within the installed directory for Microsoft Proxy Server (C:\Msp\Clients). This file is distributed to clients during setup and updated periodically by Microsoft Proxy Server.

log file

The file in which logging records are stored. This file can be either a text file or a database file.

logging

Storing information about events that occurred on a firewall or network.

LRU

See Least Recently Used (LRU).


To TopM

Management Information Database (MIB)

A standard database component that uses the Simple Network Management Protocol (SNMP) to communicate information about hardware and software processes on your network for further management and monitoring.

member server

A server that has been assigned to a Windows NT domain, but is not designated as either the primary domain controller (PDC) or a backup domain controller (BDC) within the assigned domain. See also Primary Domain Controller (PDC), Backup Domain Controller (PDC).

metric

Any measurable or significant factor that can be used in analyzing client/server-based communications.

MIB

See Management Information Database (MIB).

MIME mapping

See Multipurpose Internet Mail Extension (MIME) mapping.

Multipurpose Internet Mail Extension (MIME) mapping

A way of configuring browsers to view files that are in multiple formats.


To TopN

name resolution

A configuration that maps friendly names to IP addresses.

negative caching

Refers to the caching of HTTP error conditions associated with accessing a particular URL. If the URL is unavailable, the error response message can be cached and returned to subsequent clients that request the same URL.

Network News Transfer Protocol (NNTP)

A protocol for reading messages posted in thousands of news groups on the Internet.

NNTP

See Network News Transfer Protocol (NNTP).


To TopO

object-cache scavenger

The code that periodically scans the cache for objects to be discarded. It deletes the cache files that have not been used recently, and therefore are unlikely to be used again in the near future.

object modification checking

A function of the caching service that performs a set of tests to verify if a cached object differs from the source object being requested. If a cached object is verified to be the same as it source, the cached object is returned. If a cached object is found to be different from its source, the source object is retrieved and the cache updated.

Open Database Connectivity (ODBC)

A standard specification for data storage and access that provides a means of interchange for tabled data across varying database systems.


To TopP

packet

A fixed number of bytes that forms the basic physical unit of distribution for all networked data transmissions.

page

See Web page.

passive caching

Refers to the most common type of caching performed, frequently referred to as “on-demand” caching. In this type of service, data is cached and discarded entirely on the basis of object size, popularity, or time since the requested object was last updated in the cache. All caching updates are user-initiated in this type of caching.

password authentication

See authentication.

PDC

See Primary Domain Controller (PDC).

Peer Web Services

A collection of services that enable a computer running Windows NT Workstation to publish a personal Web site from the desktop. The services include the WWW service, the FTP service, and the Gopher service.

Point-to-Point Protocol (PPP)

In contrast to SLIP, a more recently established Internet communications protocol that standardizes dial-up networking using analog modem hardware and standard telephone lines. Although PPP is a well-standardized protocol, vendor implementations of PPP service can vary significantly.

Point-to-Point Tunneling Protocol (PPTP)

A newer networking protocol that remote users can use to access corporate networks securely across the Internet by dialing into an Internet Service Provider (ISP) or by connecting directly to the Internet. Because PPTP allows multiprotocol encapsulation, users can send any packet type over an IP network.

policies

Conditions set by the system administrator, such as how quickly account passwords expire and how many unsuccessful logon attempts are allowed before a user is locked out. These policies manage accounts to prevent exhaustive or random password attacks.

port number

A number identifying a certain Internet application. For example, the default port number for the Gopher service is 70, and for the WWW service it is 80.

Primary Domain Controller (PDC)

A server assigned to administer security for a domain. This server stores the master database of all domain-assigned security data for users and must be updated when changes in security are made. See also Backup Domain Controller (BDC), member server.

program file

A file that starts an application or program. A program file has an .exe, .pif, .com, .cmd, or .bat file name extension.

protocol

Software that allows computers to communicate over a network. The Internet protocol is TCP/IP.

proxy

A software program that connects a user to a remote destination through an intermediary gateway.

proxy client

A client device that must use a proxy host to gain access to network services not directly supported for client usage.

proxy host

A host device that acts as a relay agent between servers and clients to intercept requests and process communications on behalf of proxy clients.

Proxy ISAPI Application

A linked library that serves as an active in-process mechanism for extending Web server functionality by providing the following services: client authentication, domain filtering, cache searching for requested objects, retrieval of requested objects from the Internet as necessary, and updating cached data.

Proxy ISAPI Filter

A linked library that is called by Microsoft Proxy Server (or a Web server) that determines if a client-initiated HTTP request is to be considered as a proxy request. If so, it is handled by the Web Proxy service and forwarded to the Proxy ISAPI application or, in the case of a non-proxy request, forwarded as a standard HTTP request.


To TopR

RAS

See Remote Access Service (RAS).

RealAudio

A streaming audio protocol supported by Microsoft Proxy Server that provides continuous sound over the Internet to compatible clients. RealAudio Player can be configured to work with Internet Explorer.

Remote Access Service (RAS)

A service that allows remote client computers (RAS clients) running MS-DOS, Microsoft Windows, or Windows NT to dial in to a network server (RAS server). RAS servers can also be configured to allow local client computers to dial out to servers outside a private network.

remote administration

Administering a computer from another computer over the network.

Remote Procedure Call (RPC)

A message-passing facility that allows a distributed application to call services available on various computers in a network.

retrieve rate

Refers to the speed with which objects or URLs are taken from the cache.

router

A hardware or software device that directs network traffic. The Microsoft Proxy Server is installed behind a router within a private network environment (intranet).

RPC

See Remote Procedure Call (RPC).


To TopS

script

A group of directives to an application or utility program. A CGI application, for example. See also Common Gateway Interface.

Secure Sockets Layer (SSL)

A protocol that supplies secure data communication through data encryption and decryption.

Sequenced Packet Exchange (SPX)

A transport-level protocol developed for use in Novell networks. SPX is used in place of the Transmission Control Protocol (TCP) to verify packet delivery, assure proper sequencing of packet data, and provide connected service between devices on a network. See also connected service, Internetwork Packet Exchange (IPX).

Serial Line Interface Protocol (SLIP)

A well-established Internet communications protocol that standardizes dial-up networking.

Server Message Block (SMB) protocol

The underlying protocol by which Microsoft Windows NT-based servers communicate critical service information with one another.

service

One of the services managed through the Internet Service Manager. These include the WWW, Gopher, and FTP services provided by Internet Information Server, and the Web Proxy and WinSock Proxy services provided by Microsoft Proxy Server.

Simple Mail Transfer Protocol (SMTP)

A protocol used for exchanging mail on the Internet.

Simple Network Management Protocol (SNMP)

A standard protocol used to communicate management information for monitoring your network. See also Management Information Database (MIB).

SMTP

See Simple Mail Transfer Protocol (SMTP).

SNMP

See Simple Network Management Protocol (SNMP).

socket

A communications channel used by TCP/IP-aware applications. Sockets are data structures created by using a combination of device IP addresses and reserved TCP/UDP port numbers to indicate connection and delivery service information.

SPX

See Sequenced Packet Exchange (SPX).

SSL security

See Secure Sockets Layer (SSL).

stale data

Cached data that is outdated or inconsistent in comparison to its source.

Standard Proxy Protocol

Refers to the accepted industry-standard protocol for application-aware services established by CERN. See also CERN-proxy protocol.

static page

HTML pages prepared in advance of the request and sent to the client upon request. This page takes no special action when requested. See also interactive applications.

subnet mask

A TCP/IP configuration parameter that extracts network and host configuration from an IP address.


To TopT

tag files

Files that contain information about files on a Gopher server. This information is sent to clients and it typically contains the file name, host name, and port number.

TCP/IP

See Transmission Control Protocol/Internet Protocol (TCP/IP).

Time-to-Live (TTL)

A standard field in a TCP/IP header that indicates an age-of-expiration value that is examined by receiving stations. Data with active TTL values is maintained and forwarded on the network; data with expired TTL values is discarded.

Transmission Control Protocol (TCP)

The main transport protocol within TCP/IP that manages reliable delivery of data between networked computers.

Transmission Control Protocol/Internet Protocol (TCP/IP)

A family of networking protocols that allows computers to communicate across interconnected networks and the Internet. Every computer on the Internet supports TCP/IP.


To TopU

UDP

See User Datagram Protocol (UDP).

Uniform Resource Locator (URL)

A naming convention that uniquely identifies the location of a computer, directory, or file on the Internet. The URL also specifies the appropriate Internet protocol, such as Gopher, HTTP, and so on.

URL

See Uniform Resource Locator (URL).

Usenet

The most popular news-group hierarchy on the Internet.

User Datagram Protocol (UDP)

A transmission-level protocol in TCP/IP networking that provides connection-less service for unacknowledged delivery of packeted data. See also connection-less service.


To TopV

VDOLive Player

A stand-alone application that provides stream-oriented service for continuous video imaging. VDOLive Player can be configured to work with Internet Explorer.

virtual directory

A directory outside the home directory that appears to browsers as a subdirectory of the home directory. For any of the three services (WWW, Gopher or FTP), you can configure a virtual directory by using the Directories property sheet in Internet Service Manager.

volatile objects

Typically, files that the Web site administrator updates frequently.


To TopW

WAN

See Wide Area Network (WAN).

Web browser

A software program, such as Internet Explorer, that retrieves a document from a Web server, interprets the HTML codes, and displays the document to the user with as much graphical content as the software can supply.

Web page

A World Wide Web document. Pages can contain almost anything, such as news, images, movies, and sounds.

Web Proxy service

This service provides a means for Microsoft Proxy Server to act as a proxy host.

Web server

A computer equipped with the server software to respond to Web client requests, such as requests from a Web browser. A Web server uses the Internet HTTP, FTP, and Gopher protocols to communicate with clients on a TCP/IP network.

Wide Area Network (WAN)

A network that extends across distance and is not confined to a single site. This type of network typically involves connecting multiple sites that use multiple physical topologies.

Windows Internet Name Service (WINS) server

A protocol for mapping Internet Protocol (IP) addresses to user-friendly names. See also Domain Name System.

Windows NT Challenge/Response Authentication

A method of authentication in which a server uses Windows NT security to allow access to its resources.

Windows Sockets

A standard specification for designing interprocess communications between computers running applications that utilize TCP/IP networking. See also socket.

WINS server

See Windows Internet Name Service (WINS) server.

WinSock Proxy service

This is an API service used by Microsoft Proxy Server that provides redirection and remote execution of Windows Sockets-compatible applications over connections involving a private intranet computer and remote computers on the Internet.

World Wide Web (WWW)

The most graphical service on the Internet. It provides sophisticated linking abilities.

WWW

See World Wide Web (WWW).


© 1996 by Microsoft Corporation. All rights reserved.