Upgrading and Repairing Networks (5th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

NAAS (Novell Advanced Audit Service)

name resolution

     hardware/protocol address comparisons

     NetBIOS

         LMHOSTS file

         WINS

     NIS

     TCP/IP

     troubleshooting

     Windows 2000 Server

names

     BIND

     domains 2nd

     generic accounts

     mailboxes

     NBNS

     objects

     printers

     queries

     RDN

     registration

    users

         mapping

         tracking

    WINS [See WINS (Windows Internet Naming Service).]

namespaces 2nd [See also forests (Active Directory).]

     contiguous

     X.500

narrowbands 2nd

NAS (Network Attached Storage) 2nd

NAT (Network Address Translation) 2nd 3rd 4th

National Electrical Code (NEC)

National Institute of Standards and Technology (NIST)

navigation

NBMA (nonbroadcast multiple access)

NBNS (NetBIOS Name Server)

NBTSTAT command

NCP (NetWare Core Protocol)

NCP (Network Control Protocol) 2nd

NDIS (Network Driver Interface Specification)

NDS (Novell Directory Service) 2nd 3rd 4th [See also NetWare, decline.]

near-end cross-talk (NEXT) 2nd 3rd

NEC (National Electrical Code)

negotiations

     protocols

     Telnet options

Nelson, Ted

NET commands

     NET SHARE

     NET STATISTICS

     NET USE

     NET VIEW

NetBIOS name resolution

     LMHOSTS file

     WINS

NetBIOS Name Server (NBNS)

NETGEAR

netsh commands

netstat command

netstate command

NetWare

     decline

     directories

     drivers, locating

     iPrint utility

     Linux/Unix integration

     permissions

         Everyone group

         file system rights

         inheritance of rights

         NDS/file system rights, comparing

         object/property rights

         trustees

         Windows 2000/2003

     printing

         NPRINTER.NLM

         properties

         PSERVER.NLM

     protocols

     security 2nd

     TCP/IP

     Unix/Linux integration 2nd

     user accounts, moving

     Windows 2000 migration

         CSNW

         GSNW

         SFN 2nd

NetWare 6

     auditing

    versions

         6

         6.x

NetWare Core Protocol (NCP)

Network Address Server Settings/DHCP (Internet Connection Type dialog)

Network Address Translation (NAT) 2nd 3rd 4th

Network Connection Policy

Network Control Protocol (NCP) 2nd

Network Driver Interface Specification (NDIS)

Network File System (NFS) 2nd 3rd

     configuring

     daemons

     procedures

     RPC

     server-side daemons

     troubleshooting

     XDR

Network Information Service [See NIS (Network Information Service).]

network interface card [See NICs (network interface cards).]

network management station (NMS)

network operating system (NOS)

Network Printer Server

Network Virtual Terminal (NVT)

Network-Node Interface (NNI)

Networking Services dialog box 2nd

networks

     100BASE-FX 2nd

     100BASE-T

     100BASE-T4 2nd

     100BASE-TX

     10BASE-2 2nd

     10BASE-36

     10BASE-5

     10BASE-FL

     10BASE-T

         10BASE-2 networks, upgrading from

         upgrading from

    802.11-based [See 802.11-based networks.]

    access, controlling

         auditing

         identifying users

         resource protections

    adapters

         cards

         installing

         troubleshooting

     analyzers 2nd

         decoding protocols

         establishing baselines

         filtering protocols

         hardware

         software

         software LAN

         statistical data

     APs

     auditing

     back doors

     backbones, upgrading

    Bluetooth [See Bluetooth, overview.]

     BOOTP

         client/server exchanges (DHCP)

         DHCP

         downloading operating systems

         options fields

         packet formats

         request/reply mechanisms

     broadband local area

     broadcast storms

     cable connectors

     Cisco

     configuring

     congestion

    connections

         different cables/topologies

         repairing

     devices

     dial-up connections

         configuring Windows Professional Client

         optimizing

         PPP

         SLIP

     directories

     encryption

    ethernets

         10 Gigabit Ethernet

         adapters

         backbones

         backoff algorithm

         collisions

         Fast Ethernet

         frames

         full-duplex switches

         Gigabit 2nd

         history 2nd

         overview

         security

         switches

         topologies

         troubleshooting

         types 2nd

     history

     host systems

     HP

     IBM

     Juniper Networks, Inc.

    LANs [See LANs (local area networks), topologies.]

     layers

    logical network design

         components

         maintaining

         physical networks

         planning

     manufacturers

     Microsoft

     monitoring

     multi-tiered topologies

     multiple errors

     objects

     OSI models 2nd

     OSI Reference model

     PANs 2nd

     ping command

     protocols 2nd

     R-utilities

         authorization

         rcp

         rlogin

         rsh

         ruptime command

         rwho command

     Red Hat

     reliability

    routers

         Cisco

         configuring

         connections

         hierarchical network organizations

         Internet

         LAN responsibilities, delegating

         managing LAN sizes

         NAT/packet filtering

         ports

         protocols

         security

         selecting

     SANs

         Arbitrated Loops

         fabric switched topology

         Fibre Channel

         IP

         mixed topologies

         selecting

     scatternets

    SCSI [See SCSI (Small Computer Systems Interface).]

    security [See security, fiber-optic cables.]

    segments

         routers

         switches

     selecting

     simple repeaters

     Smaba.org

     sniffers

     SOHO

         backups

         clients

         firewalls

         network topologies

         office applications

         requirements

         routers

         topologies

         vertical-market applications

     speed

     structured wiring

         backbone cabling system

         horizontal cabling system

         work area specification

     switches

         chassis

         collapsed backbones

         cut-through switches 2nd

         full-duplex ethernet

         hardware types

         home offices

         Layer 3 switches

         managing

         results

         segmenting collision domains

         stackable

         store-and-forward switches 2nd

         troubleshooting

    testing

         BERT

         cables

         handheld cable checkers

         impedance

         pulse width

         TDR

         velocity

     topologies

     traceroute command

     traffic

     troubleshooting

         auditing

         documentation

         maintenance

         problem resolution cycle

    Unix [See Unix, NFS, procedures .]

    upgrading

         avoiding sidetracks

         closing

         deploying

         determining needs

         documenting planning

         executing pilot programs

         maintaining support

         mapping

         measuring success

         planning

         restoring

         scheduling downtime

         setting goals

         surveying users

         testing

         tracking

         training

         verifying corporate standards

     VLANs

         explicit tagging

         IEEE switch standards

         implicit tagging

         MAC addresses

         port-based

         protocol rule-based

         switches 2nd

         topologies

    VPNs [See VPNs (Virtual Private Networks).]

    WANs (wide area networks)

         back doors

         forged email

         LANs 2nd

         passwords

         PHY

         preventing attacks

         protocols

         routers

         security

         Trojan horses

         types of attacks

         viruses

    wireless [See wireless networks, topologies of.]

        802.11-based [See 802.11-based networks.]

         ad-hoc networks 2nd

         adapters, installing

         advantages 2nd

         AMA

         APs

         definition

         IEEE 2nd

         interference

         LANs, connecting to

         manual client configuration

         needs, determining

         PANs

         public places

         public spaces

         radio wave transmission

        security [See wireless networks, topologies of ; security, fiber-optic cables.]

         Service Pack 2 wireless network setup wizard

         setup wizard

        SOHO [See SOHO (small offices and home offices), routers.]

         spread-spectrum technologies 2nd

         topologies of

New Local Group dialog box

New Object-Group dialog box

New Object-User dialog box

New Printer Detection dialog box

new technologies

new top-level domains

New User dialog box

newsgroups

NEXT (near-end cross-talk) 2nd 3rd

NFS (Network File System) 2nd 3rd

     configuring

     daemons

     procedures

     RPC

     server-side daemons

     troubleshooting

     XDR

nfsstat commands

NICs (network interface cards)

     Asset/Power Management components

     autosensing

     base I/O ports

     connectors

     hardware bus types

     information, searching

     IRQ

     load balancing

     multi-homed systems

     Remote Wake-Up component

     software drivers

     troubleshooting

     WfM

     WOL

NIS (Network Information Service) 2nd 3rd

     clients

     domainname command

     maps 2nd

     master/slave servers

     slaves

     starting

     yp commands

     ypserve daemon

NIST (National Institute of Standards and Technology)

NMS (network management station)

NNI (Network-Node Interface)

nodes

     5-4-3 rule

     hidden node problems

     ring topologies

noise, testing

nominal velocity of propagation

nonauthenticated commands

nonbroadcast multiple access (NBMA)

nonmaskable interrupts

nonmicrosoft clients

nonshared topologies

nonvolatile memory (NVRAM)

NOOP command 2nd

North American Digital Hierarchy

NOS (network operating system)

notebooks

     802.11g wireless network adapters

     CardBus

notifying users of network upgrades

Novell

    Netware [See NetWare, decline.]

     Open Enterprise Server

     security

Novell Advanced Audit Service (NAAS)

Novell Directory Service (NDS) 2nd 3rd

NPRINTER.NLM

nslookup command

nslookup utility

NT (Windows)

     ActiveState ActivePerl 5.6

    domains

         controllers

         models

         replication between controllers

         trust relationships

         workgroups

     Event Log

     Event Viewer

     groups

         adding users

         assigning membership

         built-in user groups

         creating

     Korn Shell command

     NTFS

     passwords 2nd

     printers

     share-level permissions

     Telnet

     trust relationships

     Unix

    users

         accounts, managing

         name mapping

         permissions

    Windows 2000

         centralized/decentralized management

         domain controllers

         member servers

         migrating

         modeling directories

         namespaces

NTBugTraq

NTFS 2nd

null packet

numbers

     options

     ports

numerical reply codes, FTP

NVRAM (nonvolatile memory)

NVT (Network Virtual Terminal)

Категории