1. Trang chủ
  2. » Kỹ Thuật - Công Nghệ

Fiber Optics Illustrated Dictionary - Part 69 pdf

10 278 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 10
Dung lượng 904,48 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

On computer networks, for example, storage of the nonexistence of certain servers or ma-chines can lead to more efficient polling or routing of processes or network services.Ifcertain pr

Trang 1

Fiber Optics Illustrated Dictionary

the application On computer networks, for example,

storage of the nonexistence of certain servers or

ma-chines can lead to more efficient polling or routing

of processes or network services.Ifcertain printers

or fax servers are offline for maintenance, negative

caching information can be used to prevent

overflow-ing queues Ifcertain hosts are offline, routing of

packets can be renegotiated through other servers If

certain elements of an image file do not exist,

nega-tive caching can be used to prevent expensive

pro-duction tasks on a printing press or milling machine

holding up the line See NCACHE

negative feedbackThe propagation of an acoustic

or electromagnetic signal in the general opposite

di-rection of the source signal This often results from

backreflection ofthe outgoing signal or from the

sig-nal being circularly fed to the source through another

source (e.g., a second microphone).In

slower-mov-ing phenomena (e.g., sound), the delay between the

original source output and the feedback can magnify

the effects of the phenomenon and cause echo

Uncontrolled negative feedback may create

undes-ired loss ofgain, distortion, echoes, or other

interfer-ence but it is not detrimental in all circumstances.In

electronics, negative feedback in a circuit (sometimes

caned shunt feedback because the circuit is looped

back upon itself) can help condition a signal When

configured as inverse or degenerative feedback, it

may help reduce distortion, nonlinearity, and signal

instability in an amplified signal Optical negative

feedback has been proposed as a means to reduce

spectrallinewidth and noise in frequency modulated

(FM) systems

negative glowA luminous glow which can be

ob-served between an electron-emitting cathode and the

Faraday dark space in a cold-cathode discharge tube

See Faraday dark space

negative imageAnimage in which the dark and the

light values are reversed, or in which the

comple-ments of the colors are displayed instead ofthe

nor-mal colors; also called an inverse image

Photo-graphic negatives contain a negative image In

desk-top publishing, negative images are sometimes

cre-ated so the printout can be processed some way in

manufacturing For example, an image printed on

film for subsequent exposure to aprinting plate might

be printed in negative Negative images are often used

for posterization and other special effects.In

mono-chrome television display systems, a negative image

may arise from reversal of the polarity of the signals

negative plate, negative terminalIn a storage

bat-tery, the grid and any conductive material directly

attached to the negative terminal, that is, the

termi-nal that emits electrons when the circuit is active

negative-going video Ina four-field analog video

sequence, a reference point in the subcarrier cycle (the

other being positive-going) that is related to the start

of an NTSC video frame The positive-going and

negative-going cycles alternate in sequence to form

the video field

A video frame is constructed by drawing scanlines

in a sequential, repeating pattem, usually from left

to right and top to bottom at a specified rate (e.g., 30 frames per second) When the electron beam is mov-ing from right to left to begin the next line (or from bottom right to top left when it has finished the full screen) it is turned off or "blanked" so as not to in-terfere with the image on the screen In an interlaced system, it takes two screen images to makeup the fun frame since only the odd or even lines are drawn with each half-frame The process happens so fast that the human eye resolves two half-frames as a full image (although a bit of flicker may be noticed)

A horizontal drive (H drive) triggers a low-voltage negative-going pulse at the beginning ofthe horizon-tal blanking point (in standard systems this is at the right edge of the screen, the trailing edge of the scan-line that has just been drawn) and ending where the edge of the sync for the next line begins

Subcarrier/horizontal (SCIH) phase resolution is syn-chronization between the zero crossing point of the subcarrier sine wave and the negative-going (lead-ing) edge of the horizontal sync in the first field and

a specified line at the halfway point This aids in re-solving phase issues that are important in video tape recording The timing provided by the leading edge

of a negative-going pulse to the leading edge of the subsequent negative-going pulse can be used as a start-stop mechanism Similarly, negative-going and positive-going edges of the same pulse can be useful for timing and integration of signals from multiple video components

Some display monitors expect horizontal and verti-cal sync polarities to conform to certain specifications and, thus, some graphics output devices win include

a hardware switch to output the signal with

negative-going polarities A grab pulse can be a

positive-go-ing or negative-gopositive-go-ing polarity output pulse for synching video to a component such as a frame grab-ber

Negroponte, Nicolas(1943- ) Outspoken author, philosopher, and educator, Negroponte is well known

for his lectures and Wired magazine back-page

edi-torials He is the founder and director of the Massa-chusetts Institute of Technology's celebrated Media Laboratory, established in the late 1980s Prio'r to that,

he founded MIT's Architecture Machine Group, a think tank and research lab for discussing new ap-proaches to human-computer interfaces

neighborsAnetworking term used to describe nodes attached to the same link See node

nematic liquid crystalNLC Nematics are rod-like organic molecules and nematic liquid crystals are mesomorphic (between liquid and solid) structures that show clumps of thread-like flaws when stressed/ fractured, from which the name is derived

Room temperature NLCs were developed by creat-ing eutectic mixtures ofMBBA combined with other compounds to broaden the effective temperature range, but their stability and dielectric properties were not suitable for commercial components G.W Gray

of Hull University discovered cyanobiphenyl mate-rials with room-temperature nematic phases with use-ful birefringent and dielectric properties Nematic

Trang 2

that exhibit some properties of solids, such as

gen-eral orientation ofmolecules, and some properties of

liquids, such has not having a specific positional

or-der to the molecules, unor-der certain circumstances

(while il1 a thermotropic liquid crystal phase) There

is an even more specific phase in which the molecules

buddy up to each other but are not symmetric in

re-flection This slightly skewed orientation is called a

chiral nematic phase Chiral nematic liquid crystals

have a helical internal structure with interesting

cir-cular birefringent properties Thus, circir-cularly

polar-ized light entering the material will travel at

differ-ent speeds, depending upon the direction of the

po-larization and the wavelength, in relation to the

ori-entation of the chiral NLC Linearly polarized light

will similarly be affected, causing the angle of

po-larization ofthe two beams of refracted light to

pro-gressively change as they move through the crystal

NLCs are used in optical scanners with birefringent

thin films and large imaging surfaces NLCs are the

most common type of liquid crystal used in display

devices See multiplexed optical scanner technology,

Schadt-Helfrich effect, smectic liquid crystal

NENA See National Emergency Number Association

neon gas(symb - Ne)Aninert gas with many

in-dustrial and commercial applications When ionized,

neon glows red.Itwas popularly used to illuminate

signs in the 1940s and 1950s, and is still used for this

purpose, along with other gases that emit other colors

neon lampA long glass illuminating tube with an

electrode at each end and low-pressure neon gas

in-side, which may be angled into interesting shapes

When illuminated, it produces a red-orange light that

can be seen in daylight and can penetrate fog better

than most conventional types oflights Neon has also

been used in older tubes in the broadcasting

indus-tries, in simple oscillating circuits, and in

commer-cial signs

neper(pron - nay-per, symb - Np ) A

dimension-less mathematical unit for expressing relative

mea-surements It is used to express ratios that are useful

inphysics and electronics, as for voltage and current

relationships

The neper is similar to the decibel except that it is

established upon a base of2.718281828 ; quantities

expressed by nepers are based upon natural

(Napierian) logarithms rather than base 10

loga-rithms The neper is not a Systeme Intemationale (SI)

unit, but it is widely used and thus 1Np has been

as-signed an SI equivalent value of 1 In terms of

deci-bels, 1Np= 8.686 dB

The neper is named after the Scottish mathematician

John Napier (Thone Neper) who did historic research

on logarithms See decibel; Neper, Thone

Neper, Jhone(1550-1617) A Scottish

mathemati-cian, now more commonly known as John Napier,

who did pioneer work in logarithms and published

Mirifici logarithmorum canonis descriptioin Latin,

in 1614 There were no computers in those days, so

logarithmic tables had to be methodically calculated

and inscribed by hand Neper published a followup

ing calculations using ivory numbering rods (Napier's bones) marked with numbers (a physical calculating device that facilitates computations just as a slide rule facilitates computations) Neper's logarithmic dis-coveries were important fundamentals for many fu-ture discoveries in mathematics, physics, and as-tronomy

nephelometerAninstrument for measuring or esti-matingli~ht-scatteringcoefficients in fine particulate

"clouds.' Nephelometers are used to assess the prop-erties of aerosols, dust, allergens, microbes, liquid suspensions, and other small groupings of fine par-ticles by measuring light attenuation by scattering and absorption over distance

Nephelometers incorporate many optical compo-nents, including a light trap to provide a dark refer-ence against which scattered light may be assessed They may also include concentrating or diffracting lenses, one or more photomultiplier tubes, and band-pass filters If the light is to be separated into wave-lengths, they may also include prismatic components such as dichroic filters A Ronchi grating or "chop-per" may be used for calibration See dichroic, nephelometry, Ronchi grating

nephelometryThe science of light scattering or, stated another way, the study of "cloudiness" or of microscopic particles or surfaces that influence the passage and direction of travel of light Nephelom-etry is useful in the study of weather, atmospheric pollution, drug solubility, immunology, allergens, electromagnetic wave propagation, dust, and mi-crobes

Lasers have become important components in nephelometers for measuring biosystem "clouds." Thus, laser/fiber optic nephelometers are useful in-struments for counting fine particles and characterizinng suspended particles, tasks that are difficult by any other means See nephelometer; Tyndall, John

Nernst effectA potential difference (electromotive force) develops in a metal band or strip when heated This is a transverse thermomagnetic effect, Le., the force is perpendicular to the magnetic field The ef-fect is named after Walther Nernst (1864-1941) who described the third law of thermodynamics (the Nemst heat theorem) in 1905

Nernst lampA continuous source of near-infrared radiation developed byW Nemst in the 1890s It is useful in fields such as spectroscopy

NESCSee National Electrical Safety Code NESDISNational Environmental Satellite, Data and Information Service

Net Citizen, Net DenizenSee Netizen

Net PoliceA generic term for the various individu-als who moderate communications on the net for ap-propriateness, tact, good taste, honesty, and fair use Although some resent the activities ofthe Net Police, for the most part, these folks are committed, caring, hard-working volunteers who want to see the broadest possible access to the Internet, and who encourage voluntary compliance with Netiquette in order to try

Trang 3

Fiber Optics Illustrated Dictionary

to prevent government regulation of the Internet's

open communications forums See Netiquette

NETIROM A packet radio communications

proto-col which has largely superseded AX.25 It provides

support for a wider variety of types of packets with

automatic routing See AX.25

NetBIOS Frames Control ProtocolNBFCP

Origi-nally the NetBEUI protocol, NBFCP establishes NBF

Protocol to run over Point-to-Point Protocol (PPP)

NBFCP enables an end system to connect to a peer

system or to the local area network (LAN) in which

the peer is located.Itis not suitable for

interconnect-ing LANs NBFCP defines a method for

encapsulat-ing multiprotocol datagrams, a link control protocol

(LCP) for establishing and configuring the data link

connection, and a family of network control

proto-cols (NCPs) for establishing and configuring

differ-ent network-layer protocols See RFC 2097

NETBLT NETwork BLock Transfer Protocol This

is a transport level networking protocol intended for

the fast transfer oflarge quantities of data It provides

flow control and reliability characteristics, with

maxi-mum throughput over different types of networks It

runs over Internet Protocol (IP), but need not be

lim-ited to IP

The protocol opens a connection between two clients,

transfers data in large data aggregates called

"buff-ers," and closes the connection Each buffer is

trans-ferred as a sequence ofpackets Enhanced Trivial File

Transfer Protocol (ETFTP) is an implementation of

NETBLT See RFC 998

NetcastBroadcasting through the Internet, for

ex-ample, through streaming video See Webcast

NetiquetteNewsgroup etiquette, Network etiquette.

Animportant, well-respected voluntary code of

eth-ics and etiquette on the Internet Many people have

contributed to Netiquette, but it was mainly

devel-oped by Rachel Kadel at the Harvard Computer

So-ciety, and subsequently maintained by Cindy Alvarez

The whole point of having Netiquette is so that

net-work citizens can enjoy maximum freedom by not

abusing the rights and sensibilities of others, so that

the Net will remain largely unregulated and

unre-stricted This freedom depends upon the cooperation

of everyone

In the early days of BBSs, in the late 1970s, most

systems were completely open and not password

pro-tected Gradually the constant vandalism and lack of

consideration for others caused passwords to be

implemented Eventually, by the mid-1980s, even this

was not sufficient to curtail childish or destructive

be-havior and many of the system operators (sysops)

gave up trying to maintain the systems

Many ofthe same unfortunate patterns of abuse have

damaged the USENET newsgroup system, which

used to be a fantastic open forum for discussion, with

many scientific and cultural leaders participating

un-der their real names in the mid-1980s Unfortunately,

this system is now abused by bad language,

inappro-priate remarks, and get-rich-quick come-ons

Conse-quently, many groups have been forced to close up

or go to moderated status, and most celebrities now

use assumed names Ifmembers of the Internet com-munity realize that it is completely possible to vol-untarily appreciate and respect the rights of others, the Internet can remain an open resource for all

It's a good idea to read Netiquette Its adherents

en-courage people to choose voluntary self-restraint and freedom over regulation See emoticon, Frequently Asked Question, Netizen Also, Arlene H Rinaldi's

"Net User Guidelines and Netiquette" in text format

is available at many sites on the Internet, including: ftp://ftp.lib.berkeley.edu/pub/net.trainingIFAU/netiquette.txt

NetizenNet citizen or Net denizen Aresponsible user

of the Internet Many founders and users of the

In-ternet consider themselves members of a new type

of global community that shares and promotes a vi-sion ofan open, freely accessible, self-governed com-munications venue in which participants voluntarily deport themselves with responsibility, integrity, char-ity, and tolerance toward the many diverse opinions expressed online A Netizen is one who contributes

to the positive evolution ofthe Net and respects online Netiquette One could also more broadly say that any-one who uses the Net is a Netizen, although some people online have less polite terms for those who abuse their freedoms and those of others on the Net See Netiquette

netmaskA symbolic representation of an Internet Protocol (IP) address that identifies which part is the host number and which part is the network number through a bitwise-AND operation The result of this logical operation is the network number Netmasks are specified for different classes of addresses, and are used in classless addressing as well See name resolution

NetRangerAnintrusion detection utility from Cisco Systems now known as the Cisco Secure Intrusion Detection System Aservice pack was issued to sup-port the detection system sensor component to reduce the chance of the system being circumvented by an encoding vulnerability See CodeRed, virus

NETS See Normes Europeenne de Telecom-munications

Netscape CommunicationsOriginally Mosaic com-munications, Netscape Communications was the original developer and distributor of Netscape Navi-gator, the best-known open-source browser on the In-ternet The company was founded by Mark Andreessen and some very experienced business people from Silicon Graphics Corporation and McCaw Cellular Communications It had one of the highest profile public offerings in the computer in-dustry See Andreessen, Mark

Netscape NavigatorThe most broadly distributed and used Web browser on the World Wide Web, and the name of its related server software Descended from Mosaic, the browser was developed by Nets-cape Communications and widely distributed as shareware until late 1997 At that point, Netscape made the decision, in 1998, to freely distribute the software as open source software and concentrate on marketing their server software The first beta release was distributed in 1994

Trang 4

fabric, or structure A logical, physical, or electrical

grouping in which there is some electromagnetic or

biological intercommunication between some or all

of the parts A broadcast network is a physical and

communications association ofdirectors, actors,

pro-duction personnel, and technologies which together

cooperate and are used to create and distribute

pro-gramming to its viewers A computer network is one

in which computers are able to intercommunicate and

share resources by means of wireless and/or wired

connections and transmissions protocols A cellular

communications network is one in which a

coopera-tive system of wireless communications protocols,

geographically spaced transceivers, relay and

control-ling stations, and transceiving user devices are used

to interconnect callers while moving within or among

transceiving cells

network-attached storageNAS In general terms,

a dedicated file storage device or system of

associ-ated devices on a network server The NAS is

in-tended to take the storage burden off the processing

server so that a greater amount of storage and more

specialized storage-related resources can be

concen-trated within the NAS In more specific terms, NAS

is the implementation of a storage access protocol

over a network transmissions protocol (e.g., TCP/IP)

such that the storage resources are concentrated and

separate from the process server (and may even be

in a remote location)

The advantage ofNAS is that storage devices can be

placed where it is convenient to install or maintain

them and large storage closets can be established for

high-end storage needs The disadvantage is that the

burden ofthe transmissions between remote users and

the NAS is handled across the network, increasing

traffic over what would occur if the storage devices

were associated with individual workstations and

decreasing access times, depending upon the distance

and the relative load on the network

NAS is often implemented within a storage area

net-work (SAN), which is a broader concept, and may

be designated as SANINAS See NASD Project,

Na-tional Storage Industry Consortium, storage area

net-work

network, broadcastn A commercial or amateur

ra-dio or television broadcast station A few examples

of well-known broadcast networks include CBC

(Canada), BBC (Britain), ABC, NBC, and PBS

Amateurs often run local or special-interest radio,

television, or slow-scan television broadcasts See

ANIK

network, computern 1 Asystem comprising nodes

and their associated interconnected paths 2 A

sys-tem of interconnected communications lines,

chan-nels, or circuits Asmall-scale computer network

typi-cally consists of a server, a number of computers,

some printers, modems, and sometimes scanners, and

facsimile machines The highway system is a type of

network, as is the very effective train system in

Eu-rope See local area network, wide area network

network access control NAC Network policies,

the data transmissions to a server, switching/routing component, network, workstation, or peripheral de-vice Password accounts, dedicated workstations and peripherals, gateways, firewalls, and employee passcards are examples ofNAC components and pro-cedures

NAC policies and systems are of particular interest

at institutions where sensitive information or expen-sive services must be handled efficiently or protected from tampering or misuse NAC is important in busi-ness and educational local area networks and particu-larly important in classified government and military systems, especially on systems where links to the outside world through the Internet are desired with-out compromising internal security In some cases biometrics (e.g., iris scans) may be used to control access to computer terminals or rooms Monitors and logs may be implemented to oversee general use and

to provide an audit trail to check back through un-usual activities See authentication, firewall, gateway

Network Access PointNAP Amajor backbone point which provides service to ISPs and is designated to exchange data with other NAPs NAP was a devel-opment in the mid-1990s which arose from the change in the U.S Internet from a single, dominant backbone to a shared backbone across four NAPs (California, Illinois, New Jersey, Washington, D.C.)

See MAE East, MAE West, Metropolitan Area Eth-ernet, Public Exchange Point

network addressAnidentifier for a physical or logi-cal component on a network Components often have

a fixed hardware address, but may also have one or more logical addresses Logical addresses may change dynamically as the network is altered physi-cally, or as the network software is tuned or proto-cols changed Network addresses are typically asso-ciated with nodes and stations See address resolu-tion, domain name, Media Access Control

network administrator I The human in charge of the installation, configuration, customization, secu-rity, and lower level operating functions of a com-puter network On larger networks, these tasks may

be divided among a number of professionals See SysOp 2 A software program that handles details of the job of a human network administrator Activities automated with network administration software in-clude monitoring, archiving, and system checks See daemon, dragon

Network Applications ConsortiumNAC A trade organization seeking to support and promote gener-ally accepted standards rather than a large number of fragmented proprietary standards for network appli-cations in order to promote interoperability

http://www.netapps.org/

Network Control ProtocolsNCP The Point-to-Point Protocol handles assignment and management of Internet Protocol (IP) addresses and other functions through a family of Network Control Protocols (NCPs) which manage the specific needs oftheir as-sociated network-layer protocols See Point-to-Point Protocol, RFC 1661

~:'.'

• ".••.~•.•:••.'••X •.::/,l •

Trang 5

Fiber Optics Illustrated Dictionary

network driveA drive accessible to multiple users

on a computer network On some network systems,

users have to specify and access a particular drive to

take advantage ofthe shared storage space On other

systems, the shared arrangement can be set up so that

it is transparent to the user and, in fact, a volume may

traverse several drives Network drives are sometimes

configured for data redundancy in case one drive or

partition becomes corrupted See redundant array of

inexpensive disks

Network Driver Interface SpecificationNDIS A

network protocol/driver interface jointly developed

by Microsoft Corporation and 3Com Corporation

NDIS provides a standard interface layer that receives

information from network transport stacks and

net-work adapter card software drivers The transport

pro-tocols are thus hardware-independent

network elementNE This is defmed in the

Telecom-munications Act of 1996, and published by the

Fed-eral Communications Commission (FCC), as:

" a facility or equipment used in the provision

ofa telecommunications service Such term also

includes features, functions, and capabilities that

are provided by means of such facility or

equip-ment, including subscriber numbers, databases,

signaling systems, and information sufficient for

billing and collection or used in the transmission,

routing, or other provision of a

telecommunica-tions service."

See Federal Communications Commission,

Telecom-munications Act of 1996

networkfax serverA workstation equipped with

facsimile or fax/modem hardware and software so

multiple users of the network can route a fax in and

out through the server This removes the necessity of

having a fax system attached to each computer The

fax server can then also be located nearer its

associ-ated phone line There are fax servers that can use

Internet connections (T1, frame relay, etc.) rather than

phone lines to send and receive messages

network filterA transducer designed to separate

transmission waves on the basis of frequency

Network Information ServiceNIS A client/server

protocol de.veloped by Sun Microsystems for

distrib-uting system configuration data among networked

computers, formerly and informally known as

Yel-low Pages NIS is licensed to other Unix vendors

network interfaceNI Ajunction or reference point

in a network that supports or represents a change in

the physical and/or logical structure of a link or, in

some cases, represents a jurisdictional change (even

ifthere is no physical change or data conversion) The

point at which a phone service line connects to a

subscriber's premises is a network interface and

vari-ous aspects of this connection have been

standard-ized For example, the network interface electrical

characteristics and interactions for an analog

connec-tion between a telecommunicaconnec-tions carrier and the

customer premises are described in ANSI

T1.401-1993

network interface card, network interface

control-lerNIC APC board that provides a means to

physi-cally and logiphysi-cally connect a computer to a network For microcomputers, typically these cards are equipped with BNC and/or RJ-45 sockets facing the outside ofthe computer and edge card connectors that fit into the expansion slots inside a computer The cables resemble video cables, or fat phone cables, depending upon the type used

Most systems require a physicalterminatoron the physical endpoints ofthe network (ifthe network isn't working, it may be because termination is missing

or incorrectly installed) Separate software, not in-cluded with the computer operating system, may be required to use the specific card installed

Many workstation-level computers come with net-work hardware and software built in, and Macintosh users are familiar with the built-in AppleTalk hard-ware and softhard-ware The trend is for microcomputers

to useTCP/IPnetworking over Ethernet

Network Integration Verification TestNIVT A test designed to evaluate and improve three different Front End Processors (PEPs) handling routing and transport protocols in mixed high-performance rout-ing systems with large Topology Databases to assess scalability Information on NIVT and actual test re-ports are available through the ffiM Web site

network interface functionNIF A function associ-ated with a specific interface link in a network For example, there may be specific translation functions

in the interface between a subscriber's computer and the Network Interface Device (NIC) supplied by a service provider, e.g., in ISDN networks

network intrusion detection system NIDS Ameans

or set ofprocedures and/or programs designed to alert the system administrator or individual users about vandalistic attacks or unauthorized access to a com-puter network There are many types of intrusion, including system flooding, virus insertion, account access, file access, and physical access NIDS more often refers to the first four categories (physical ac-cess to the electronics inside a computer may be tected by video cameras, marks, fingerprints, or de-tection chemicals, but this type of intrusion is less prevalent than day-to-day attempts by unauthorized users to view, steal, or compromise data on a system.)

An intrusion detection system is rarely just one ap-plication or device, but rather the coordinated imple-mentation ofa collection ofpolicies, procedures, and tools to ensure system security

In general, NIDS refers to systems that actively de-tect signs of intrusion (e.g., a utility that dede-tects re-peated entries of incorrect passwords) as opposed to passive systems that primarily deter intrusion (e.g.,

a password to access an account)

As networks and databases with sensitive informa-tion are increasingly connected to the Internet, they become more accessible and vulnerable to outside in-truders Electronic commerce sites on the Web are particularly vulnerable, as there are people who search for credit card numbers, bank accounts, per-sonal identification, and other commodities that are recorded on computer systems Two of the more im-portant intrusion detection mechanisms include:

Trang 6

cent statistics and events On older

sys-tems and mainframes, monitors

com-monly represent data as text displays

ar-ranged in columns On some of the

newer systems, graphical tables and

graphs are also available System

moni-tors are often bundled with operating

systems to allow sysops to view CPU

usage, connection requests, numbers of

users, entries and exits to the system,

locations of machines being accessed,

numbers or types of packets being

transferred, URLs of users accessing

Web servers, etc Operators use a

com-bination of live audio/visual

monitor-ing and software utilities to generate an

alert when anomalous patterns occur

logs Records of activities The data

gener-ated by monitors are often kept in

run-ning logs that can be archived

indefi-nitely or stored for a period ofhours or

months, depending on the need In

ad-dition to system monitors, software

in-stallation and system reconfiguration

activities are often logged to record

when changes were made, which files

were added or deleted, and where the

files were installed Intruders are not

al-ways high-tech computer experts; often

they are employees snooping or

steal-ing data with little understandsteal-ing ofthe

electronic trail they leave when they

en-gage in unauthorized access Even if

they do search for logs, with the

inten-tion ofchanging or deleting them, they

may be unsuccessful if the system is

configured to duplicate log entries on

another computer or a protected

direc-tory

One of the more difficult types of intrusion to detect

is access by someone who has stolen a legitimate

password Since the intruder isn't breaking into the

system, but logging on normally, the intrusion may

go unnoticed for a long time However, even this type

of activity can sometimes be detected with a

combi-nation ofmonitors and logs IfCPU usage during the

night or lunch hour is usually low, and the various

monitors show John Doe's account becomes active

during times when John isn't at his desk, there is

rea-son to investigate the anomalous patterns Intrusion

detection systems are, in large part, dependent upon

the ability of the system administrator and the

capa-bility of the system to determine normal usage

pat-terns and variations from the norm

The most difficult type ofintrusion to detect is

unau-thorized activity by a system administrator or

pro-grammer A small percentage of sysops take

advan-tage of their privileged positions for personal gain

Since a high-level administrator or systems

program-mer has access to almost everything on a network,

unethical use of network resources They are also expert at hiding a data trail when using one system

to access another or when snooping on password-pro-tected file systems These types ofintrusion often go unnoticed until funds disappear or until strange things happen after the individual leaves a project or firm The primary ways to reduce system administrator in-trusions are careful employee screening, built-in ac-countability policies and procedures, and good em-ployee relations For the most part, system adminis-trators are intelligent, dedicated professionals, proud

of their systems and concerned about maintaining good system security Contrary to what might be ex-pected, the majority ofintrusions are probably not by system administrators, but by curious or mischievous programmers on the one hand and professionals try-ing to divert funds or information or save a buck on the other (statistics suggest that a surprising propor-tion of computer-related theft is by doctors and businesspeople as opposed to university students and teenagers)

Network intrusion detection is not a simple configu-ration that can be set up and used indefinitely Com-puter security requires a responsive approach to a dynamically changing environment, like a farmer adapting to constantly changing weather and market conditions A system administrator must monitor, fine-tune, and reconfigure on an ongoing basis to achieve network security See cracker, firewall, hacker, virus, worm

Network Job EntryNJE A communications proto-col developed by IBM that arose out of the wide-spread use ofRemote Job Entry(RJE)protocol used for the remote submission of computer processing jobs.RJEcould be used in conjunction with the main-frame Job Entry Subsystem (JES) to enable RJE-en-abled workstations to submit jobs to a centralized mainframe system Network Job Entry grew out of JES, extending JES and the functionality ofRJE NJE enables two JES subsystems on different host com-puters or in different local partitions to intercommu-nicate, thus supporting peer-to-peer communications ofcommands andjob submissions on IBM host sys-tems NJE was developed at the time when mainframe prices were coming down and multiple mainframes began to be installed in separate locations It enabled specialization ofmainframe computing functions and efficient use ofcomputers with different capabilities While the protocol has been around for quite a while,

it is less well known thanRJE.BITNET was an im-portant historical precursor to the Internet based on the NJE protocol See BITNET

Network Layer PacketNLP In High Performance Routing on packet networks, a basic message unit that carries data over the path See datagram

Network Management ProcessorNMP Anetwork switch processor module used to control and moni-tor the switch

Network Management ProtocolNMP Aset ofpro-tocols developed by AT&T to control and exchange information with various network devices

Trang 7

Fiber Optics Illustrated Dictionary

Network Management System NMS.An

adminis-trative service tool for subscriber networks that

en-ables the system administrator to adjust performance

characteristics and to set bit rates and user settings

according to the levels of service available to

sub-scribers

Network News Transfer Protocol NNTP Asoftware

application developed in the mid-1980s to provide a

way to more quickly and efficiently query, retrieve,

and reference information from newsgroups through

NNTP servers It also facilitates list management of

newsgroup discussions NNTP is a network news

transport service Newsgroups may be accessed

through the Web from local clients using the NNTP

URL scheme as follows:

nntp://<host>:<port>/<newsgroup-name>/

<article-number>

For global access to newsgroups, the news: scheme

is preferable See news, RFC 977, RFC 1738

Network Operations Center NOC A centralized

around-the-clock facility for monitoring and

main-taining a network, which may remotely service

smaller centers such as POPs NOCs typically

pro-vide a number of technical support and accounting

services as well Most large networks (computer,

phone, broadcast) have a core staff dedicated to the

physical and logistical tasks of keeping the system

running, well-maintained, and current One of the

most prominent NOCs is the U.S Air Force NOC,

formerly the Air Force Network Control Center

network prefIXes Identifiers used to aggregate

net-works Networks are divided into classeswith the

ability to serve up to a certain number of hosts The

prefix identifies the class, and hence the number of

possible hosts

Network Reliability and Interoperability Council

NRIC.Anadvisory committee formed to provide

rec-ommendations to the Federal Communications

Com-mission (FCC) and the telecommunications

indus-tryregarding network reliability and interoperability

of public telecommunications networks The

origi-nal charter was filed in 1992 The most recent

man-date was to operate until January 2002 The NRIC

works through a number of focus groups and

subteams See Committee Tl, New Wireline Access

Technologies http://www.nric.org/

Network Security Information Exchange NSIE A

forum for identifying issues ofnetwork security such

as unauthorized or malicious entry or tampering that

might affect national security and emergency

pre-paredness telecommunications systems Members

exchange information on viruses, threats, incidents,

and other attacks on public telecommunications

net-works

network service point NSP Cisco Systems

technol-ogy that provides native SNA network service point

support

Network Solutions, Inc NSI.In1993, this company

was awarded the contract for registering Internet

domain names with the InterNIC by the National

Science Foundation NSI was acquired by Scientific

Applications International Corporation (SAIC) in

1995 See InterNIC

Network Terminal Number NTN.Anidentification number assigned to a tenninal on a public network by the public network administrator The ITU-T recom-mends that public voice/data and digital voice net-works also assign NTNs The NTN is a designation within the Data Network Identification Code (DNIC) for public networks interconnected with X.75 See Data Network Identification Code, X Series Recom-mendations

Network Video NV A freely distributable Sun SPARC-, DEC-, SGI-, HP-, orffiMRS6000-based videoconferencing system developed at Xerox PARC, which supports video, audio, and whiteboard-ing over Mbone networks

Network Voice Protocol NVP The historical fore-runner ofthe Voice File Exchange Protocol proposed for the ARPANET in the mid-1980s, the NVP was submitted in November 1977 by Danny Cohen on behalfofa cooperative effort ofthe ARPA-NSC com-munity

We tend to think ofvoice carried over computer net-works as a development ofthe late 1990s, but the idea has its roots much earlier and has been active on ex-perimental systems since the 1970s and on some com-mercial systems since the mid-1980s NVP was first implemented in December 1973, and was subse-quently used for local and remote realtime voice com-munications over the ARPANET at some of the ma-jor research facilities in the U.S

The development of secure, low-bandwidth, two-way, high-quality, realtime, digital voice communi-cations was a major objective of the ARPA Network Secure Communications (NSC) project It was, at the time, a high-priority military goal, intended to facili-tate command and control (C2) activities By imple-menting the concept with digital technologies, en-cryption could be used to help protect the content of communications NYP consists of a control pro-tocol and a data propro-tocol See Voice File Exchange Protocol, RFC 741

Neumann, John von See von Neumann, Janos neural computer A computing system theoretically designed to behave like the human brain in terms of performing logical, intelligent problem-solving and inferential "thinking" activities, which also may structurally mimic the interconnective structural to-pology ofbiological neurons in a centralized nervous system Aneural computer, like the human brain, con-figures itselfthrough experientialleaming, feedback, and internal reorganization over time Neural com-puters are not entirely theoretical, except in their most ideal form There have been many efforts and suc-cesses in the design ofneural and bionic systems since the early 1960s, with worldwide efforts by major companies to design and implement practical neural computers on a small scale since the 1970s and on a large scale since the late 1980s and early 1990s A neural computer is a specialized type of super-computer, since "supercomputer" implies the state of the art in computing at anyone time, and existing

Trang 8

processing and problem-solving speeds.

Neural net architectures tend to be highly parallel,

withmultiple registers, several layers, and a high level

of interconnection between nodes The concepts of

neural computers date back to the 1940s, to the work

ofW McCulloch, W Pitts, A Rosenblueth, and N

Wiener See artificial intelligence; bionics; neural

network; Wiener, Norbert

neural network In a broad sense, a type of network

organization that mimics the human nervous system,

particularly the brain, in physical structure and

con-nectivity or neural functioning as it relates to

think-ing, or both Simulation ofneural networks, and

mod-eling ofthe complex reasoning, generalizations, and

inferences characteristic ofhuman thinking have long

been ofinterest to programmers and scientists

study-ing artificial intelligence While the creation of

an-droids, humanoid intelligent robots, is probably some

time in the future, some interesting advances in

pro-gramming have resulted from studies of neural

net-work functioning Software that has the ability to

gen-eralize and make choices, react, and further

config-ure itself in response to feedback is being developed

with practical applications in many areas, including

robotics Neural networks can aid machines and

hu-mans in unfamiliar environments

Speculation about neural networks and "thinking

machines" has been around at least since Ada

Love-lace proposed, in the 1800s, that intelligent machines

might someday produce art and poetry In the late

1940s, Norbert Wiener, Arturo Rosenblueth, and their

colleagues were discussing concepts related to

"cy-bernetics," a tenn popularized by Wiener in

Cyber-netics: or, Control and Communication in the

Ani-mal and the Machine.In 1963, inElectronics World,

Ken Gilmore described the work on bionic

comput-ers being carried out at Wright-Pattcomput-erson Air Force

Base in Ohio and modeling ofindividual neuronal

cir-cuits by companies like Bell Laboratories and the

Ford Motor Company In the 1950s and early 1960s

there were already many experimental

implementa-tions of various aspects of neural networks,

includ-ing electronic maze-runninclud-ing mice,

pattern-recogniz-ing machines, self-organizpattern-recogniz-ing machines, and

simu-lations of human vision systems See artificial

intel-ligence; bionics; Harmon, L.D.; Melpar model;

MIND; pattern matching; perceptrons; Sceptron;

Wiener, Norbert

neuroeleetrieity The very minute level

electromag-netic fields generated by the activities of biological

neurons See neural network

neuronIna biological system, cells specialized to

code and conduct an electromagnetic impulse are

called neurons Anetwork ofinterconnecting neurons

is called a nervous system, and a network of

inter-connecting neurons with a main processing center is

called a central nervous system, with the main

pro-cessing center called the brain

Neuron Chip A commercial microcontroller chip

with the LONTalk automation control protocol

em-bedded into the chip This enables the chip to be used

dustrial and residential devices, including fans, switches, motors, motion sensors, valves, and more The Chip includes three 8-bit inline central process-ing units, two of which are dedicated to LONTalk protocol processing, with the third dedicated to the node application program The chip has built-in memory and 11 general-purpose input/output pins for interfacing with circuits

Neuron Chips are programmed in Neuron C and can access the built-in LONTalk communications soft-ware and network management functions, as well as schedulers, and arithmetic/logic application runtime libraries Neuron C is an object extension to ANSI C LONTalk is an open standard for control automation networks The Neuron Chip is available through Cy-press Semiconductor and Toshiba Corporation See LONWORKS, LONTalk

neutral In stasis, in equilibrium, stable, balanced, normal, unaffected, neither positive nor negative, not tending to one side or the other, nor one state or an-other Neither acid nor base

neutrodyne In early radios, an amplifying circuit used in tuned receivers Voltage was fed back by a capacitor to the circuit to neutralize it See hetero-dyne, superheterodyne

New England Museum of Wireless and Steam Located in Rhode Island, this museum preserves the original Massie station, the oldest surviving, origi-nally equipped wireless station

New Haven District Telephone Company Ahistoric exchange that welcomed its first subscriber, Rev John

E Todd, in 1878 By February 21, 1878, the company's first telephone directory included almost

50 subscribers, primarily physicians and businesses, listed according to professions No numbers were assigned to the subscribers, as operators handled the calls and phone numbers did not come into use in this area until 20 years later

NewleoFormerly ICO Global Communications (est 1995), a London-based satellite communications ser-vice, spun off from the Inmarsat Project 21 Hughes Electronics has a large interest in the company, and Hughes Telecommunications and Space Company is building the satellites Other ICO Global investors in-cluded COMSAT Corporation, Beijing Maritime, Singapore Telecom, Deutsche Telecom, and VSNL (India)

The original plan was to launch ten satellites plus two spares, into medium Earth orbits (MEO) at 10,000 Ianusingbent pipeanalog transponders The satel-lites would be divided between two orbital planes, inclined 45° relative to the Earth's equator, orbiting once every 6 hours Some innovations are planned; the solar wings carry gallium arsenide rather than sili-con solar cells and the propulsion system is hydra-zine-based Thennal control is achieved in part with

a sun nadir steering system, which orients the panels toward the sun, and the radiating surfaces away from the sun C- and S-band capabilities will support 4500 simultaneous phone conversations

Six ICONET satellites were scheduled to come online

Trang 9

Fiber Optics Illustrated Dictionary

in the initial stages to interface with 12 Earth stations

Start of service was scheduled for the year 2000 but

has been adjusted to 2003 for the New ICO voice and

packet-data services New ICO is a McCaw-led

ac-quisition that has resulted in an updated version of

the ICO Global Communications project with some

modifications to the satellites in production and the

inclusion of third-generation (3G) wireless services

in the new plans

New Wireline Access Technologies NWAT AFocus

Group subteam of the Network Reliability Council

established to examine reliability in key services

de-ployed over the Public Switched Network (PSN)

NWAT endeavored to identify, define, and clarify

potential selVice reliability issues associated with new

wireline technologies and to provide

recommenda-tions and potential solurecommenda-tions The project ran from

August to December 1995 Of particular concern

were Hybrid Fiber/Coax (HFC) and

Fiber-to-the-Curb (FTTC) access networks, which were evaluated

against Digital Loop Carrier (DLC) and cable

televi-sion (CATV) as benchmarks Participants came from

many key fmns in the industry, including Bellcore,

Cable Labs, Motorola, NYNEX,u.s. West, Time

Warner, and others

New York and Mississippi Valley Printing

Tele-graph Company An early American

communica-tions business organized by Hiram Sibley in 1851

which, as it expanded westward, came to be called

Western Union, a name suggested by Sibley's

asso-ciate, Ezra Cornell Western Union subsequently

in-stalled the first transcontinental line in 1861

newbie A telecommunications greenhorn; a new or

inexperienced user There's nothing wrong with

be-ing a newbie, but new users must read the

introduc-tory information, charters, and FAQs (Frequently

Asked Questions) associated with the activity they

wish to pursue It's OK to ask questions on the Net,

but the first question should always be "Where can I

read the FAQ for this channellnewsgroup/discussion

list?" Reading the FAQ will conserve bandwidth, save

time, and can spare an individual a great deal

ofper-sonal or professional embarrassment See Netiquette

news, Web access There are a number of ways in

which programmers have implemented access to

in-ternet newsgroups through Web interfaces

Tradition-ally, news has been read through Unix command line

text interfaces, and many still read the various

news-groups this way There are also dedicated newsreaders

which run on individuals' machines

When a browser is designed to support the display of

newsfeeds, newsgroup articles can be accessed

through the Web with two types ofUnifonn Resource

Locators (URLs) as follows:

news:<newsgroup-name>

e.g., news:comp.sys.1inux

news:<message-id>

News URLs are location-dependent See NNTP, RFC

1036, RFC 1738

newsgroup Aprivate or public online forum, the

larg-est of which is the USENET system USENET has

more than 35,000 newsgroups, covering every

con-ceivable topic from a/t.religion to a/t.bondage Most

newsgroups function on a subscription basis; current software makes it reasonably easy to subscribe at the moment at which you would like to read the mes-sages Not everyone has access to the same USENET newsgroups; it depends partly on what topics your Internet Services Provider has downloaded for its subscribers Postings on various newsgroup forums can range from one or two messages a day to several

thousand a day A newsreader software program can help sort out the topic threads.

Ina text-based newsreader, the various newsgroups will be listed alphabetically; in graphical newsreaders, they may be hierarchically organized

in menus The following simple text-based excerpt shows the general format of newsgroup names

alt.humor alt.humor.best-of-usenet alt invest

comp.sys.mac.advocacy comp.sys.next.software comp.theory.info-retrieval humanities.philosophy.objectivism misc.business.marketing.moderated misc.entrepreneurs.moderated misc legal

misc.legal.moderated sci.astro

The above names have a hierarchical structure from general to more specific The general topics listed

above include alternate, computer, humanities,

mis-cellaneous, recreation, and science Anyone can cre-ate a newsgroup, given sufficient community support and interest Creation ofa new USENET newsgroup requires a body ofvoters to ferry a proposal through

a lengthy submission/acceptance process, which may take 4 to7 months This is necessary as a deter-rent to frivolous group creation

Some newsgroups are moderated Unfortunately, due

to inappropriate postings, open newsgroups are de-creasing in number This puts an unfair burden on moderators, who are generally volunteers, but at least

itis a way to keep a forum alive When youpost to a

moderated group, the posting is previewed for adher-ence to the topic, or content, or both Some news-group moderators reserve the right to edit actual post-ings (although this is rare) Read the charter before you post if you don't wish to have your postings al-tered If the message meets the requirements for the group,itis then posted by the moderator This pro-cess can take from a few hours to a few days, some-times even up to a week and a half

Ifyou are offended by the topic ofa group, don't read the postings Newsgroups have evolved with a very strong commitment to the tenets of free speech, and their participants vehemently guard their right to ex-press and discuss their views online in the appropri-ate forum

Netiquettehas been developed to provide guidelines

to the effective and courteous use of the USENET

system Read Netiquette and the charter for each

group before posting; then enjoy; USENET is the

Trang 10

to the sum total ofhuman knowledge at anyone time.

It is a living, breathing "expert system" where you

can seek answers and support on any topic, any time

of day or night See Call for Votes, Netiquette,

USENEI

newsreader A software program for accessing,

dis-playing, searching, and posting articles to public

In-ternet newsgroups, particularly USENET You need

access to the Internet to read the postings on

news-groups Newsgroups have certain customs and

tra-ditions, and you should read the newsgroup

Neti-quette before posting, as well as the Frequently Asked

Questions (FAQ) document for that particular

news-group It is also wise to read the existing postings for

several days before contributing, to understand the

format and content oftypical postings, and not to

end-lessly repeat a topic that may have been fully

dis-cussed A good newsreader program will enable you

to follow threads, conversations on a particular topic.

There are usually many discussion threads within any

given newsgroup Pine, a popular Unix-based email

program developed at the University ofWashington,

can be used as a newsreader, as can a Web browser

Google Groups now provides searchable access to a

huge historic newsgroups archive See newsgroup

newton Aunit offorce in the meter-kilogram-second

(MKS) system of physical units of a size that will

influence a body of a mass of 1 kg to accelerate 1 m

per second per second Named after Sir Isaac

New-ton

Newton, Isaac (1642-1727)AnEnglish scientist and

mathematician acknowledged as one of the greatest

contributors of basic knowledge of our universe

through his descriptions of the laws of motion and

theory of gravitation (Philosophiae Naturalis

Principia Mathematica, 1687) and the idea that

earthly and celestial events might obey the same laws

He also studied the nature of light (Optics, 1692),

described the nature ofwhite light and its component

colors, and laid much of the foundation for modem

calculus

Newton's rings Aring-shaped interference

phenom-enon that results from reflected radiant energy

asso-ciated with transparent surfaces held very close

to-gether with a fine layer ofair in between The center

of the rings is dark, with alternating dark and light

bands with subtle colors emanating outward in

con-centric rings

Robert Boyle was the first to describe and explain

the phenomenon and Robert Hooke reported in

Micrographia (1667) that he had observed the rings.

Isaac Newton made use of the phenomenon to

pol-ish lenses After carrying out experiments with

prisms, Newton presented theories on the nature of

color that were more accurate than Hooke's, which

may be why the rings are called Newton's rings and

not Hooke's rings, but perhaps they shouldn't be

called Newton's rings either, because Newton

ac-tively discounted the significance of the rings,

say-ing they were "not necessary for establishsay-ing the

Properties of Light." Thomas Young, on the other

some important mathematical explanations for the rings In 1801, Young interpreted the interference as resulting from light interaction in the air between the reflecting/refracting surfaces, strong support for the wave nature of light

You can generate the rings ifyou put a flat or convex transparent glass almost touching a convex piece of glass Now carefully move one of the pieces closer and farther away from the other to vary the thickness

of the layer of air At the point where the air between the sphere and flat surface is of the same order as the wavelength ofthe light, the colored rings will appear through the glass

Newton's rings are an interesting way to illustrate diffraction and are useful in polishing and checking lenses Sometimes the phenomenon is undesirable,

so there are various ways to reduce/eliminate the rings, including changing the distance between or ori-entation of the two proximate surfaces, using glass-less carriers for darkroom work, or using a light dust

of talcum powder on the glass lens See dIffraction, interference

NEXT See near end crosstalk

NeXT Unix-Based Workstation

The NeXT cube was promoted as the computer for the 1990s when it was released in 1988 Surprisingly, this marketing hype has held true, even though the NeXT is no longer manufactured Many corporations are adopting Unix as their standard, as educational institutions havefor years; graphical user interfaces are now ubiquitous, and Display PostScript still pro-vides one ofthe best WYSIWYG solutions on any sys-tem Many NeXTStep aspects are now in Mac OS X

NeXT computer The NeXT computer was unveiled

in early October 1988 by Steve Jobs' company NeXT, Inc It included the first commercial erasable optical drive and incorporated VLSI technology The pro-grammable digital signal processor (DSP5600 1) came built in The operating system was Unix-based, with a gorgeous graphical display interface incorpo-rating Display PostScript The fonts and graphics are all beautifully rendered in high resolution The NeXT had some inspired input from Stanford,

Ngày đăng: 02/07/2014, 13:20