Upgrading and Repairing Networks (5th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

AAL (ATM Adaption Layer)

AC (alternating current)

AC/DC converters

Academic Source Release (ASR)

Accelerated Graphics Port (AGP)

acceptable use statements

access

     Anonymous Access

     Arbitrated Loops

     CSMA/CD

     databases

     dial-in

     LDAP

     Linux

     methods

     NBMA

    networks, controlling

         auditing

         identifying users

         resource protections

     NTFS 2nd

     R-utilities

     share-level permissions

     shared network media

     SMB

     Unix

    users

         limiting time

         permissions

     VPN

     Web-based printers folders

    Windows NT

         adding users to groups

         assigning group memberships

         built-in user groups

         creating user groups

         groups

         managing user accounts

     workstations

Access Code field

Access Control Lists (ACLs) 2nd

access control mechanisms (network security)

     auditing

     resource protections

     users, identifying

access points [See APs (Access Points), adding to wired networks.]

Account Information dialog box

Account Policy dialog box

accounts

     Account Information dialog box

     computers, managing

     generic

     interdomain trust relationships

     lockouts

     time, limiting

     tracking

    users

         complete trust models

         managing 2nd

         searching

         Unix

     Windows NT

     workstations

ACK (acknowledgement) packets

ACL (Asynchronous Connection-Less)

ACLs (Access Control Lists) 2nd

ACPI (Advanced Configuration and Power Interface) 2nd

ACR (attenuation to cross talk ratio)

acronyms

ACT (Access Control Commands)

Action menu

     Event Viewer

     MMC 2nd 3rd

     WINS

Active Directory 2nd

     ADSI

         directory-aware application programming

         member servers

     application

     attributes

     directory services

     DNS

     domain models

     global catalog

     groups

     managing

    migration

         BDCs, upgrading

         implementing

         joining trees

         master domain model

         PDCs, upgrading

     objects 2nd

         searching

         standard

     partitioning

     replicating

     schema 2nd

     services

     sites

     standards

     trees

     Windows 2003 Server

Active Directory Computers and Users snap-in

Active Directory Migration Tool (ADMT)

Active Directory Service Interface (ADSI) 2nd

Active Directory Users and Computers command (Start menu)

active mode

active monitor

active open connections

ActiveState ActivePerl 5.8

ad hoc networks 2nd

ad hoc wireless networks 2nd

ad-hoc mode (wireless network adapters)

adapters

     cards

     installing

     networks, troubleshooting

     PCMCIA

Add Button dialog box

Add Printer dialog box

Add Printer Wizard 2nd

Add Server dialog box

Add Standalone Snap-in dialog box

Add Trusted Domains dialog box

Add Users and Groups dialog box 2nd

Add/Remove Snap-in dialog box

adding

     Active Directory schema

     computers

     labels

     links, DFS roots

     objects, databases

    printers

         Windows 2000

         Windows NT 4.0

     servers

     stacks

     users

Address field

Address Resolution Protocol (ARP) 2nd

addresses

     APIPA

     base I/O ports

     broadcast

     destination 2nd

     IP

         ARP

         cable modems

         Class A

         Class B

         Class C

         Class D

         Class E

         datagram headers

         filtering

         proxy ARP

         RARP

         spoofing

         subnetting

         supernetting

     MAC 2nd 3rd

     mulitcast

     Option classes

     protocols

     reserving

     reusing

     routers

    scope

         configuring

         creating

     spaces

     unicast

-adduser command (Unix)

administration

     Active Directory 2nd

     centralized management

     complete trust models

     decentralized management

     directories

    domains

         controllers

         interdomain trust relationships

         models

         replication between controllers

         trust relationships, creating

         Windows NT

     groups

         adding users

         assigning group memberships

         built-in user groups

         creating user groups

     IEEE 802.1

     installation

    printers

         Windows 2000

         Windows NT 2nd

     rights, delegating

    routers

         delegating LAN responsibilities

         LAN sizes

     switches

     tools, installing

    users

         accounts

         Unix 2nd

     Web-based printers folders

     WINS

         Action menu

         netsh commands

         Windows 2000

         Windows 2003 Server

     wiring

ADMT (Active Directory Migration Tool)

Adobe Reader

ADSI (Active Directory Service Interfaces) 2nd

ADSL (Asynchronous Digital Subscriber Line)

Advanced Audio/Video Remote Control Profile (AVRCP)

Advanced Configuration and Power Interface (ACPI) 2nd

Advanced Power Management (APM)

aero domain

AES (Advanced Encryption Standard) 2nd

agents

     proxy

     relay 2nd

AGP (Accelerated Graphics Port)

AH (Authentication Header)

AirSnort

alarms 2nd

alerts (Unix)

algorithms

     backoff

     congestion avoidance

     Dijkstra

     OSPF

     SHA

     Truncated Binary Exponential Backoff Algorithm

allowing dial-in access

ALOHA project

ALOHAnet

alternate migration plans

alternation current (AC)

ALWIL software

AMA (Open Mobile Alliance)

American National Standards Institute (ANSI) 2nd

American Power Conversion Corp (APC)

American Standard Code for Information Interchange [See ASCII (American Standard Code for Information Interchange).]

analog modems

analyzers

     baselines

     networks

     printing statistics

    protocols

         decoding

         filtering

         hardware

         software

Anixter

Anonymous Access

ANSI (American National Standards Institute) 2nd

Antheil, George

anti-virus

     applications

     tips

Anycasts

APC (American Power Conversion Corp)

API (application programming interface)

APIPA (Automatic Private IP Addressing) 2nd

APM (Advanced Power Management)

Application Compatibility Toolkit

application gateways 2nd 3rd 4th

Application layer

application programming interface (API)

application-specific integrated chips (ASICS) 2nd

applications [See also utilities, R-utilities.]

     10BASE-2 networks

     Active Directory

     ADSI

     assessing

     backing up

     Cisco

     competing products

     corporate standards

     deleting

     drivers

     firewalls

     FTP

         commands

         data transfers

         ports/processes

         Red Hat Linux

         replies

         TFTP

         Windows command-line clients

     gateways

     HP

     IBM

     IP addresses

     Juniper Networks, Inc.

     legacy

     manufacturers

     Microsoft

     NetWare and Unix/Linux integration 2nd

     network sniffers

    office

         CrossOver Office

         Microsoft Office Student and Teacher Edition 2003

         OpenOffice.org 2nd

         selecting

         StarOffice

         StarOffice 8 Suite

         WordPerfect Office X3

     print servers

     proxy

     Red Hat

     Samba.org

     security

     TCP/IP

     Telnet

         commands

         NVT

     Tripwire

     Trojan horses

     upgrading

     vertical-market

     virus-checking

     viruses

applying

     NAS

     routers 2nd

     SANs

     Start/Search method

     switches

     Windows

         2000/2003 Event Viewer

         NT 4.0 Event Viewer

     WINS

APs (Access Points)

     10/100 Ethernet switches

     802.11b networks

     ad-hoc networks, compared

     adding to wired networks

     alternatives

     bandwidth in the real world

     bottlenecks, diminishing

     CDs, configuring

     DHCP servers

     dual-mode Access Points

     firewalls

     limitations

     locations, choosing

     Network Address Translation

     rogue Access Points

     small wireless networks, creating

     types

     virtual private networks

     wireless routers, compared

    Wireless-G broadband router installation [See Wireless-G broadband router installation, PCs, configuring.]

Arbitrated Loops 2nd

architecture

     ATN

     IEEE 802

     IEEE 802.1

     IEEE 802.10

     IEEE 802.11

     IEEE 802.2

     IEEE 802.3

     IEEE 802.4

     IEEE 802.5

     IEEE 802.7

     SCSI

ARCnet

ARP (Address Resolution Protocol) 2nd

arp command

ARPANET

arranging domains

Artisoft LANtastic

ASCII (American Standard Code for Information Interchange)

     Telnet NVT

     transfers

ASICS (application-specific integrated chips) 2nd

ASR (Academic Source Release)

Asset Management component

assigning

     group memberships

     users

asymmetric encryption

Asynchronous Connection-Less (ACL)

Asynchronous Digital Subscriber Line (ADSL)

Atheros Super G

ATM (Asynchronous Transfer Mode) 2nd

     architecture

     connections

     Frame Relay

     frames

     IP over

     LAN emulation

     service categories

ATM Adaption Layer (AAL)

ATRN command

attacks

     denial of service 2nd 3rd

     digital certificates

     forged email

     ICMP redirects

     Ping of Death

    WANs

         back doors

         forged email

         passwords

         preventing

         Trojan horses

         types of attacks

         viruses

attenuation 2nd

     fiber-optic cables

     testing

attenuation to cross talk ratio (ACR)

attributes

     Active Directory

     property set

     selected

     User Account object

Audio/Video Remote Control Profile

Audit Policy dialog box

auditing

     enabling

     Linux

     NetWare 6

     networks

     reports

     Unix

    Windows

         2000/2003

         NT 4.0

         XP Professional

Auditing Entry dialog box

AUTH command

authenticated commands

authentication

     basic authentication

     digest

     domain controllers 2nd

     encrypted

     integrated Windows

     LDAP

     pass-through

     Telnet

     Unix/Linux compared to NetWare

Authentication Header (AH)

authorization

     delegating for network security

     DHCP

     R-utilities

     share-level permissions

     user-level permissions

AUTHORIZATION state

Automatic Private IP Addressing (APIPA)

automount command

autonomous systems (RIP)

     router updates

     scalability

     version 2

autosensing

AVCP (Audio/Video Remote Control Profile)

AVRCP (Advanced Audio/Video Remote Control Profile)

Категории