IP Addressing Fundamentals

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

Acceptable Use Policy (AUP)

access

     MAC addresses

access control lists (ACLs)

ACLs (access control lists

acquisitions

     address space 2nd 3rd

adding

     subnets

addresses

     128-bit

    16-bit

         subnetting 2nd 3rd 4th

     20-bit

     24-bit

    24-bit networks

         creating subnets 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

     anycast

    base 16

         notations 2nd 3rd

     blocks

         made-up

         preserving 2nd 3rd 4th 5th 6th 7th 8th

         stolen

     broadcasting

    CIDR

         supernetting 2nd 3rd 4th 5th 6th 7th 8th

    CIDR. [See CIDR]

    Class B

         Date of Doom 2nd 3rd 4th 5th

    foreign

         support 2nd 3rd 4th

     global

     GLOP 2nd 3rd

     hijacking

    host

         inefficiencies of FLSMs

     IP 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

         assigning

         hierarchies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

         multicasting 2nd 3rd 4th 5th 6th 7th

         translating MAC addresses 2nd 3rd 4th 5th 6th 7th

         vulnerabilties 2nd 3rd 4th

    IPv6

         architecture 2nd 3rd

         comparing to IPv4 of 2nd

         migration tools 2nd 3rd 4th 5th 6th 7th

         types of 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

     limited-scope

     MAC

     managing 2nd 3rd

         acquiring 2nd 3rd

         Balkanizing 2nd 3rd 4th 5th 6th 7th

         enterprise WANs 2nd 3rd 4th 5th

         hostmasters 2nd 3rd 4th

         inheriting 2nd

         Internet hosting centers 2nd 3rd

         ISP 2nd 3rd 4th 5th 6th

         planning 2nd 3rd 4th 5th 6th 7th

         sequential assignment 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

         symmetrical gaps 2nd 3rd 4th

         tactics 2nd

     mapping

     multicast 2nd 3rd

    NAT. [See NAT]

     nonreportable

     nonroutable

     private spaces 2nd 3rd 4th 5th

     rationing

     reserved 2nd

     security

         lending 2nd 3rd

         open networking 2nd 3rd 4th 5th 6th 7th 8th 9th

         RFC 2267 2nd 3rd 4th 5th

     spoofing

    subnets

         inefficiencies of FLSMs

     subnetting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

    subsets

         NAT

     translation tables

     unused 2nd 3rd

addresses. [See also URL]

addressing

     class-based

     hosts

    IP

         FLSM inefficiencies 2nd 3rd 4th 5th 6th

     IPv4 2nd

     third tiers 2nd

administration

     addresses 2nd

         Balkanizing 2nd 3rd 4th 5th 6th 7th

         planning 2nd 3rd 4th 5th 6th 7th

         sequential assignment 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

         symmetrical gaps 2nd 3rd 4th

         tactics 2nd

    groups

         multicast 2nd 3rd

advantages

     open standards 2nd 3rd

aggregatability

     CIDR 2nd 3rd 4th

     optimizing

aggregatable global unicast addresses 2nd

aggregation

     CIDR

     SLA

allocation

     blocks

     Class A IP address spaces

     Class B IP address spaces

     Class C IP address spaces

     Class D IP address spaces

    hierarchies

         enterprise WANs 2nd 3rd 4th

     hostmaster roles

     IP addresses

     IP addressing 2nd 3rd 4th 5th 6th 7th 8th

American National Standards Institute (ANSI)

ANSI (American National Standards Institute)

any-to-any communications. [See also communications]

anycast addresses

applications

     working groups

applying

     VLSM 2nd 3rd 4th 5th 6th 7th

approval pocesses

     IETF 2nd 3rd

approval processes 2nd 3rd

architecture

    addresses

         IPv6 2nd 3rd

     CIDR 2nd 3rd 4th

     DNS 2nd

     unicast addresses 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

ARP

    MAC addresses

         translating 2nd 3rd 4th 5th 6th

assignment

    address spaces

         from inventories

     anycast addresses

     IP addresses

     multicast addresses 2nd 3rd

assignments

     hostmaster roles

     IP addresses 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

     oversized blocks

attacks 2nd 3rd 4th 5th

     DDoS

     DoS

         defenses 2nd

     IP addresses 2nd 3rd 4th 5th

     man-in-the-middle

     networks

         address lending 2nd 3rd

         open networking 2nd 3rd 4th 5th 6th 7th 8th 9th

         RFC 2267 2nd 3rd 4th 5th

     smurf 2nd

AUP (Acceptable Use Policy)

automatically configured tunnels

Категории