Microsoft Internet Security and
Acceleration Server 2000
A store of frequently retrieved objects and URLs located on the
cache drive of an ISA computer. Instead of retrieving an object
directly from an Internet Web server, the object is stored and
retrieved from the cache instead. Caches improve network
performance by reducing the number of objects retrieved from the
Internet based on their popularity.
The amount of space reserved on a selected server disk drive
for use in storing cached files.
The ability to either cache or not cache objects retrieved from
World Wide Web (WWW), FTP, or Gopher sites.
The forwarding of a client HTTP request from one ISA computer
to another ISA computer. Also known as cascading or chaining. See hierarchical
An industry standard for application-aware proxy services over
HTTP-based client/server communications. CERN standards are
established by the European Laboratory for Particle Physics (CERN),
located in Switzerland.
A programming structure that includes both data and
functionality. A COM object is defined and allocated as a single
unit. The only public access to a COM object is through the
programming structure's interfaces. At a minimum, a COM object must
support the IUnknown interface, which maintains the object's
existence while it is being used and provides access to the
object's other interfaces.
The speed with which objects or URLs are added to the
Gateway Interface (CGI)
A standard interface for HTTP server applications. Used by an
application that runs on a server to generate dynamic content based
on parameters sent by the requesting Web browser.
A Windows object that efficiently manages threads used for
A service that provides a managed connection allowing networked
computers to communicate reliably. (Also known as streamed
service.) TCP and SPX protocols support this type of service. Four
important characteristics include:
The path for data packets is established in advance.
The resources required for a connection are reserved in
A connection's resources are reserved throughout the life of
When a connection's data transfer is completed, the connection
is terminated and the allocated resources are freed.
A service that emphasizes broadcasting and unacknowledged
delivery of data packets. Supports higher throughput speeds for
real-time applications. UDP is a protocol that
supports this type of service.
An authentication method used to validate client-to-server and
server-to-server communication. Credentials include a user name and
a password that is used to validate requests from client computers
or from other computers in an array or chain.