Sams Teach Yourself TCP/IP in 24 Hours (4th Edition)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

CA (certificate authority) 

cabling rules (network architecture) 

cabling type (network architecture) 

caching-only servers  2nd  3rd 

Capture group (RMON 1) 

Carrier Sense Multiple Access with Collision Detect (CSMA/CD)  2nd 

Cascading Style Sheet (CSS) 

case study  [See Hypothetical, Inc. case study]

Cc field (e-mail) 

cd command (FTP) 

certificate authority (CA) 

certificate servers 

certification paths 

CGI  [See Common Gateway Interface]2nd  [See Common Gateway Interface]

CGI (common gateway interface) scripts

    security issues  2nd 

Challenge Handshake Authentication Protocol (CHAP) 

CHAP (Challenge Handshake Authentication Protocol) 

chargen command  2nd 

chat groups (Internet)  2nd 

    defined 

Checksum field (TCP data format) 

Checksum field (UDP datagram header)  2nd 

CIDR (Classless Internet Domain Routing)  2nd  3rd  4th  5th 

    defined 

Class A addresses 

    converting to dotted decimal notation  2nd 

    defined 

    interpreting 

Class A networks

    hosts supported in 

    reverse lookup zone files 

    subnetting  2nd  3rd  4th  5th 

        binary pattern equivalents  2nd  3rd 

Class B addresses 

    converting to dotted decimal notation 

    defined 

    interpreting 

Class B networks

    hosts supported in 

    reverse looku zone files 

    subnetting  2nd  3rd 

        binary pattern equivalents  2nd 

Class C address

    defined 

Class C addresses 

    converting to dotted decimal notation 

    interpreting 

Class C networks

    hosts supported in 

    subnetting  2nd  3rd 

        binary pattern equivalents 

Class D addresses  2nd 

    defined 

Class E addresses  2nd 

    defined 

classes

    IP addresses

        address ranges (table)  2nd  3rd 

Classless Internet Domain Routing (CIDR)  2nd  3rd  4th 

    defined 

Classless Internet Domain Routing) 

classless networks  2nd 

client-side HTML techniques  2nd 

clients 

    emerging technologies

        terminal clients  2nd  3rd 

    Web services 

    Windows Internet Name Service (WINS) 

clients (e-mail) 

    e-mail reader 

    Post Office Protocol (POP3) 

    Simple Mail Transfer Protocol (SMTP)

        client commands  2nd 

clients (HTTP)

    TCP with  2nd  3rd 

clients (Internet) 

    World Wide Web  2nd 

        Web browsers  2nd 

close command (FTP) 

close command (Telnet) 

clustering technologies (servers)  2nd  3rd  4th 

CNAME resource record 

ColdFusion (Allaire) 

commands

    File Transfer Protocol (FTP)

        ascii 

        binary 

        bye 

        cd 

        close 

        dir 

        ftp  2nd 

        get 

        help 

        ls 

        mget 

        mkdir 

        mput 

        open 

        put 

        pwd 

        quit 

        rmdir 

        status 

        type 

        user 

    GET 

    get (SNMP) 

    getnext (SNMP) 

    help (NSLookup utility) 

    ifconfig  2nd 

    ipconfig 

    ls (NSLookup utility) 

    ls -a (NSLookup utility) 

    ls -d (NSLookup utility) 

    net view 

    nslookup 

    ping 

    R* utilities

        rlogin 

        rsh 

        ruptime 

        rwho 

    Remote Copy utility

        rcp  2nd  3rd 

    rexec 

    route add 

    route change 

    route delete 

    route print 

    server (NSLookup utility) 

    set (SNMP) 

    set all (NSLookup utility) 

    Simple Mail Transfer Protocol (SMTP)  2nd 

        client commands  2nd 

        server response codes  2nd 

    Telnet  2nd  3rd 

        ? 

        close 

        display 

        environ 

        logout 

        mode 

        open 

        quit 

        send 

        set 

        telnet 

        unset 

    winipcfg 

commands.   [See also utilities]

Common Gateway Interface (CGI)

    defined 

    scripts  2nd 

common gateway interface (CGI) scripts

    security issues  2nd 

communication processes

    network protocol suites 

compression

    SLIP (Serial Line Interent Protocol) 

compressnet command 

computer infiltration methods  2nd 

    buffer overflow attacks  2nd  3rd 

    CGI script attacks  2nd 

    denial of service attacks  2nd 

    denial of service attacks (DOS)  2nd 

    e-mail worms 

    obtaining access permissions  2nd  3rd 

    password theft  2nd 

        guessing passwords  2nd  3rd 

        interception  2nd 

        protecting against  2nd  3rd 

        Torjon horse program 

        Trojan horse programs 

        user/administrator inattention  2nd 

    session hijacking 

computer IP addresses 

computers

    host computers

        routing tables  2nd 

    multihomes  2nd  3rd  4th 

    new technologies

        wireless devices  2nd  3rd 

confidentiality

    802.11 security 

configuration information utilities  2nd  3rd  4th  5th 

configuration problems  2nd 

    diagnostic utilities

        arp 

        configuration information utilities 

        Ping  2nd  3rd  4th  5th  6th 

    diagnostic utilties

        arp  2nd  3rd 

        configuration information utitilities  2nd  3rd  4th 

configuring

    DHCP

        Linux networks  2nd 

        Windows NT  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 

    DNS servers  2nd  3rd 

        reverse lookup zone files  2nd 

        zone files  2nd  3rd  4th  5th 

    Dynamic Host Configuration Protocol (DHCP)

        Windows NT networks 

    e-mail readers 

    hostname resolution 

        hosts file  2nd  3rd  4th 

connection-oriented protocol

    TCP protocol  2nd 

connection-oriented protocols  2nd  3rd 

    TCP protocol  2nd  3rd 

        active open state 

        connections  2nd  3rd  4th 

        data format  2nd  3rd  4th  5th  6th 

        end node notification  2nd 

        flow control  2nd 

        passive open state 

        resequencing 

        security 

        stream-oriented processing 

        three-way handshake  2nd  3rd 

connectionless protocols  2nd  3rd 

    UDP protocol  2nd  3rd  4th  5th  6th 

        datagram header  2nd  3rd 

connections

    10BASE-2 ethernet cables 

    point-to-point connections (dial-up connections)  2nd  3rd 

    Point-to-Point Protocol (PPP)  2nd  3rd  4th 

    TCP protocol  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 

        three-way handshake 

connectivity devices 

    bridges  2nd  3rd 

    hierarchical addressing 

    hubs  2nd  3rd 

    routers  2nd  3rd  4th 

        routing process  2nd  3rd  4th  5th 

    signal regeneration 

    switches  2nd  3rd  4th 

    traffic control function 

    uses for 

connectivity functions 

connectivity problems 

    excessive traffic 

        diagnosing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 

    fault name resolution 

    line problems 

        diagnosing  2nd 

    name resolution problems

        diagnosing  2nd  3rd 

    protocol dyfunctions 

connectivity utilities  2nd 

Content-Encoding field (HTTP header) 

Content-Language field (HTTP header) 

Content-Length field (HTTP header) 

Control flags field (TCP data format)  2nd 

conventional encryption  2nd  3rd  4th  5th  6th  7th  8th 

core routers 

costs

    total cost of ownership  2nd 

crackers

    hackers versus 

CRC (Cyclical Redundancy Check) 

Create Scope dialog box (DHCP Manager)  2nd 

Create Scopt (Local) dialog box 

CSMA/CD (Carrier Sense Multiple Access with Collision Detect) 

CSS (Cascading Style Sheet) 

cut-through switching 

Cyclical Redundancy Check (CRC) 

Категории