Upgrading and Repairing Networks (5th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

p-node clients

pac command

Packet Drivers

Packet Header field

packets

     Bluetooth

     BOOTP

     Configure-Request

     DHCP

     DHCPINFORM

    ethernets

         802.2 LLC standard

         802.3 standard

         Ethernet II/PARC

         frames

     filtering 2nd 3rd

         intrusion detection

         routers

     magic

page messages

Palms

Palo Alto Research Center (PARC) 2nd

PAM (Password Authentication Manager)

panel patches 2nd 3rd

PANs (personal area networks) 2nd 3rd

paper documentation

PAR (Project Authorization Request)

parameters

     -debug

     -nobsd

     -nofork

     passwords

     Unix

PARC (Palo Alto Research Center) 2nd

parity checks

park mode

partial mesh topologies

partial synchronization

partitioning Active Directory

partner servers

pass-through authentication

passband technologies

passive open connections

password Authentication Manager (PAM)

passwords

     clear-text

     construction guidelines

     default passwords, changing

     grabbers

     interdomain trust relationships

     policies 2nd

         account lockouts

         expirations

         history lists

         managing

     smart cards

     synchronizing

     tracking

     Unix

     Windows NT

patches (panels) 2nd 3rd

Pathworks

pattern hopping

Payload Type (PT)

PC cards

PC-cillin Internet Security suite

PCF (Point Coordination Function)

PCI (Peripheral Component Interconnect) 2nd

PCL (Printer Control Language)

PCL.SEP

PCMCIA

PCS (Physical Coding Sublayer)

PDAs (Personal Digital Assistants)

     BlackBerries

     features of

     overview

     portable media centers, compared

     smartphones, compared

PDCs (primary domain controllers) 2nd 3rd

PDU (Protocol Data Unit)

peer-to-peer networking models

performance

     cables

     NAS

Peripheral Component Interconnect (PCI) 2nd

permanent virtual connection (PVC)

permissions

     cumulative effects of

     Linux

     NetWare

         comparing NDS/file system rights

         Everyone group

         file system rights

         inheritance of rights

         object/property rights

         trustees

     NTFS 2nd

     SGID

     share-level

     SUID

     Unix

     user-level

personal area networks (PANs) 2nd 3rd

Personal Digital Assistants [See PDAs (Personal Digital Assistants), overview.]

Personal Information Managers (PIMs)

personnel, network upgrades

PGP (Pretty Good Privacy) 2nd

phones

     2.4GHz cordless telephone

     smartphones

PHY (Physical layer) 2nd

     802.11 networks

     ATM

     IEEE 802

     IEEE 802.11 standards

Physical Coding Sublayer (PCS)

physical interface cards (PICs)

Physical layer [See PHY (Physical layer).]

physical measures (network security)

Physical Media Dependent (PMD) 2nd

physical networks, planning

physical topologies 2nd 3rd

Piano

piconets

PICs (physical interface cards)

PID (process ID)

pilot programs

PIMs (Personal Information Managers)

ping command 2nd 3rd 4th

Ping of Death

piracy

pitfalls of troubleshooting

Plain Old Telephone Service (POTS)

planning

     components

     disaster recovery

     logical network design

     maintenance

    migration

         arranging domains

         BDCs, upgrading

         centralized/decentralized management

         domain controllers

         implementing to Active Directories

         joining trees

         master domain model

         member servers

         modeling directories

         namespaces

         PDCs, upgrading

    networks

         avoiding sidetracks

         closing

         deploying

         documenting upgrades

         executing pilot programs

         measuring success

         restoring

         scheduling downtime

         setting goals

         testing

         training

         upgrading

         verifying corporate standards

     physical networks

     upgrading

PLOGI (Port Login)

plugs

PMD (Physical Media Dependent) 2nd

Point Coordination Function (PCF)

point-to-point connections (leased lines)

     Fractional T1

     T-carrier system

     troubleshooting T-carrier system

Point-to-Point Protocol over Ethernet (PPPoE) 2nd

policies 2nd

    auditing, configuring

         Windows 2000/2003

         Windows NT 4.0

     passwords 2nd

     security

         acceptable use statements

         elements to include

         escalation procedures

         guidelines for usage

         Network Connection Policy

         passwords

poll packets

pools (printers)

POP3 (Post Office Protocol)

Port Forwarding/Triggering dialogs

Port Login (PLOGI)

portable media centers

ports

     back doors

     base I/O

     filtering

     FTP

     identifiers

     IP addresses

     legacy compatibility

     numbers

     routers

     switches

     TCP

     UDP

     uplink

     VLAN (virtual LAN)

     Windows NT

Positive Completion replies

Positive Intermediate replies

Post Office Protocol (POP3)

post-implementation reviews

PostScript

POTS (Plain Old Telephone Service)

power conditioning

Power Management component

power problems (SOHO networks)

power strips

Power SUM

PPP (Point-to-Point Protocol) 2nd

     frames

     LCP

     NCP

     RFCs

     Windows 2000 Professional Client

PPPoE (Point-to-Point Protocol over Ethernet) 2nd

PPTP (Point-to-Point Tunneling Protocol)

     selecting for wireless networks

     VPNs

pr command

PRBS (pseudorandom binary sequence)

Pre-Shared Key (PSK)

Preboot Execution Environment (PXE)

predefined groups

Presentation layer

Pretty Good Privacy (PGP) 2nd

prevention

    attacks

         digital certificates

         WANs

     down time

    maintenance

         backups

         disaster recovery

         documenting

         network monitoring

         NICs

         redundancy

         routine

         UPS

     network congestion

     security measures

         host computers

         routers

         training

         Tripwire

         updating

         virus-checking applications

PRI (Primary Rate Interface)

primary domain controllers (PDCs) 2nd 3rd

primary servers

primitives 2nd

Print Operators group

Print Server

Printer Control Language (PCL)

printers

     auditing

     events

     naming

     Properties

     searching

     Server Properties

     sharing

     troubleshooting

     Unix/Linux compared to NetWare

     Web browsers

     Windows NT

printing

     FORTRAN

     hardware-based print servers

     IPP

     languages

     NetWare

         NPRINTER.NLM

         properties

         PSERVER.NLM

     print server applications

     protocols

         BSD

         IPP

         TCP/IP

     statistics

     Unix

     Windows 2000

     Windows NT 4.0

    Windows print servers

         adding printers

         printers/printing devices

     Windows XP Professional

PrintQueue object

privacy

private keys

privileges [See also rights, Windows NT, groups .]

problem resolution cycle

procedures 2nd

     NFS

     security

     troubleshooting

process ID (PID)

process of elimination, troubleshooting

profiles

     Bluetooth

         Cordless Telephony

         Dial-Up Networking

         Generic Access

         Headset

         Intercom

         Serial Port

         Service Discovery Application

     users

Project Authorization Request (PAR)

promiscuous mode 2nd

properties

     Document

     FTP

     MMC 2nd

     NetWare

     Print Queue object

     Print Server 2nd

     Printer

     Printer object properties

property set attribute

proprietary extensions

     802.11a

     802.11b

     802.11g

protection [See security, routers.]

protocols

     analyzers

         decoding protocols

         establishing baselines

         filtering protocols

         hardware

         software

         statistical data

     ARP

     Bluetooth

     BOOTP 2nd

         client/server exchanges (DHCP)

         DHCP

         downloading operating systems

         options fields

         packet formats

         relay agents

         request/reply mechanisms

         support

     BSD

     configuring routers

     DECnet

     DHCP 2nd 3rd

         allocation

         APIPA

         authorizing servers

         BOOTP 2nd

         client/server exchanges

         clustering

         configuring

         customizing

         daemons

         DNS

         exclusions/reservations

         installing servers

         large/routed environments

         leasing servers

         managing logging

         MMC Action menu

         Red Hat Linux

         relay agents 2nd

         troubleshooting

     DISP

     EGP

     file servers

     filtering

     FTP

         commands

         data transfers

         firewalls

         ports/processes

         Red Hat Linux

         replies

         TFTP

         Windows command-line clients

     HELLO

     HTTP

     ICMP 2nd

     IGMP

     IGP

     IMAP4

         client commands

         commands

         data formatting

         mailbox naming

         states

         system flags

         universal commands

     IP 2nd

         addressing

         ARP

         connections

         datagram headers

         Fibre Channel

         implementing

         proxy ARP

         RARP

         SANs

         subnetting

         supernetting

         unacknowledged protocol

         unreliable protocol

     IPCP

     IPP

         installing

         object types

         operations

         Version 1.1

         Windows 2000

     IPv6

         comparing to IPv4

         extension headers

         headers

         Options Type field

     IPXCP

     ISAKMP

     L2CAP

     LAN

     LCP

     LDAP 2nd

         binding requests

         comparing databases

         databases

         directories

         interoperability between directories

         metadirectories

         X.500

     limitations

     LMP (Link Manager Protocol)

     lpr/lpd

     Mount 2nd

     multi-protocol label switching

     name resolution

     NAS

     NCP (NetWare Core Protocol) 2nd 3rd

         burst mode

         requests/responses

         terminating

     NetWare version 6

     NFS 2nd

         configuring

         daemons

         procedures

         RPC

         server-side daemons

         troubleshooting

         XDR

     OBEX

     OSI

     POP3

     PPP

         configuring Windows 2000 Professional Client

         LCP

         NCP

         RFCs

     RARP 2nd

     RIP

         router updates

         scalability

         version 2

     RMON (Remote Monitoring Protocol) 2nd

     routers 2nd

     SAP

     SDP

     selecting

     SLIP

     SMB

         CIFS

         files

         negotiation

         NET commands

         Samba

     SMTP (Simple Mail Transfer Protocol) 2nd

         commands

         extensions

         models

         response codes

         transactions

     SNMP 2nd 3rd 4th

         MIB

         primitives

         proxy agents

         RMON

         SNMPv2/SNMPv3

     Spanning Tree

     stacks 2nd 3rd

     stateful

     stateless

     TCP 2nd

         configuring sessions

         connections

         ending sessions

         headers

         LANs

         managing sessions

         security

         sessions

    TCP/IP

         name resolution

         OSI Reference model

         Unix

     TCS

     Telnet

         authentication

         commands

         NVT

     TFTP

     UDP 2nd 3rd

         headers

         ICMP interaction

     UNIX

         BOOTP

         DHCP

         FTP

         TCP/IP 2nd

         telnet

         Telnetxxx

     VLAN

     VPNs

         AH

         ESP

         IKE

         IPSec

         L2TP

         PPTP

     WANs

protocols Data Unit (PDU)

proxy agents

proxy applications

proxy ARP (Address Resolution Protocol)

proxy servers 2nd 3rd 4th

Proxy Settings dialog box

PSCRIPT.SEP

PSERVER.NLM

pseudorandom binary sequence (PRBS)

PSK (Pre-Shared Key)

PSTN (public switched telephone network) 2nd 3rd 4th 5th 6th

PT (Payload Type)

Public group

public keys 2nd

public places, wireless networks

public switched telephone network (PSTN) 2nd 3rd 4th 5th

pulling records

pulse width, configuring

pushing records

PVC (permanent virtual connection)

PXE (Preboot Execution Environment)

Категории