Upgrading and Repairing Networks (5th Edition)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

NAAS (Novell Advanced Audit Service)  

NAK (Negative Acknowledgement)   2nd   3rd  

NAK (negative acknowledgment)  

name resolution

       hardware/protocol address comparisons   2nd  

       NetBIOS   2nd  

               LMHOSTS file   2nd   3rd   4th   5th  

               WINS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

names

       BIND (Berkeley Internet Name Domain)  

       domain  

       domains

               NIS (Network Information Service)   2nd  

       NBNS (NetBIOS Name Server)  

       queries   2nd  

       RDN  

       registration   2nd   3rd   4th  

       resolution

               NIS (Network Information Service)   2nd  

               TCP/IP   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th  

               troubleshooting   2nd   3rd  

               Windows 2000 Server  

       users

               mapping   2nd  

               tracking  

namespaces   2nd   3rd  

       contigous  

       X.500   2nd  

               acronyms   2nd   3rd   4th  

               schema  

namespaces.   [See also forests]

naming

       generic accounts  

       mailboxes   2nd  

       objects

               Active Directory   2nd   3rd  

               NetWare   2nd   3rd   4th   5th  

       printers  

       WINS (Windows Internet Naming Service).   [See WINS]

narrowband  

narrwoband   2nd   3rd  

NAS

       selecting   2nd   3rd   4th  

NAS (Network Attached Storage)  

NAT

       routers   2nd  

NAT (Network Address Translation)   2nd   3rd   4th   5th   6th   7th  

National Electrical Code (NEC)  

National Institute of Standards and Technology (NIST)  

navigation   2nd   3rd   4th   5th  

NBMA (nonbroadcast multiple access)  

NBNS (NetBIOS Name Server)  

NBTSTAT command  

NCP

       independence   2nd   3rd   4th  

NCP (NetWare Core Protocol)   2nd   3rd   4th   5th  

       burst mode  

       packet signatures   2nd  

        requests /reposnses   2nd   3rd   4th  

       signature options   2nd   3rd   4th   5th   6th  

       terminating  

       troubleshooting packet signatures   2nd  

NCP (Network Control Protocol)   2nd   3rd  

NCP (Novell Core Protocol)  

NDIS (Network Driver Interface Specification)   2nd  

NDS

       Bindery

               comapring   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

       rights

               comparing  

               inheritance of   2nd   3rd   4th  

NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th  

       configuring   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th  

NDS (Novell Directory Service)  

NDS (Novell Directory Service).   [See also NetWare]

NDS (Novell Directory Services)  

NDS Manager

       applying  

               creating replicas   2nd   3rd  

               partitioning   2nd  

               synchronizing servers   2nd  

near-end cross-talk (NEXT)  

Near-End Cross-Talk (NEXT)   2nd  

near-end cross-talk (NEXT)  

NEC (National Electrical Code)  

Negative Acknowledgement (NAK)   2nd   3rd  

negative acknowledgment (NAK)  

negotiation

       protocols

               SMB   2nd  

negotiations

       Telnet options   2nd   3rd   4th   5th   6th   7th   8th  

Nelson, Ted  

NET commands  

       NET SHARE   2nd   3rd  

       NET STATISTICS   2nd   3rd   4th  

       NET USE   2nd   3rd  

       NET VIEW   2nd   3rd  

NetBIOS

       name resolution   2nd  

               LMHOSTS file   2nd   3rd   4th   5th  

               WINS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

NetBIOS Name Server (NBNS)  

NETGEAR  

netsh commands   2nd   3rd  

netstat command   2nd   3rd   4th   5th   6th   7th  

netstate command   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

Netware

       administration   2nd   3rd  

NetWare

       applications   2nd   3rd   4th  

       connection-oriented services   2nd  

       connectionless services   2nd  

       directories

               interoperability   2nd  

               selecting   2nd  

       Directory Service.   [See NDS]

       directory structures   2nd  

               Bindery   2nd  

               Bindery Services   2nd   3rd   4th   5th  

               comparing Bindery/NDS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               configuring NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th  

               NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th  

       eDirectory  

               features   2nd   3rd   4th  

               installing   2nd   3rd   4th  

       files

               sharing   2nd  

       iPrint utility   2nd  

       IPX (Internetwork Packet Exchange)   2nd  

                frames   2nd  

               packets   2nd   3rd   4th   5th  

       linux

               comparing   2nd   3rd   4th   5th  

       Linux

               moving user accounts   2nd   3rd  

               providing services   2nd   3rd  

               user authentication  

       login  

       NCP

               independence   2nd   3rd   4th  

       NCP (NetWare Core Protocol)   2nd  

               packet signatures   2nd  

               signature options   2nd   3rd   4th   5th   6th  

               troubleshooting packet signatures   2nd  

       NWADMN32   2nd   3rd  

       objects

               creating   2nd   3rd   4th   5th   6th   7th   8th  

               recoginition   2nd  

       permissions   2nd  

               comparing NDS/file system rights  

               configuring   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  

               Everyone group   2nd  

               file system rights   2nd  

               inheritance of rights   2nd   3rd   4th  

               object/property rights   2nd   3rd   4th  

               trustees  

               Windows 2000/2003   2nd   3rd   4th   5th   6th   7th   8th  

       printers

               sharing   2nd  

       printing   2nd   3rd  

               NPRINTER.NLM   2nd  

               Print Queue object properties   2nd  

               Print Server object properties   2nd  

               Printer object properties   2nd   3rd  

               PSERVER.NLM   2nd  

       protocols   2nd   3rd   4th   5th   6th  

       resources

               accessing  

       security  

               AUDITCON/SYSCON utilities   2nd   3rd   4th   5th   6th  

       Security Equivalance   2nd  

       SPX (Sequenced Packet Exchange)   2nd  

               communications   2nd  

               packets   2nd  

               SPXII   2nd  

       TCP/IP  

NetWare 6

       auditing   2nd  

NetWare Core Protocol (NCP)   2nd   3rd   4th   5th  

       burst mode  

       packet signatures   2nd  

       requests/responses   2nd   3rd   4th  

       signature options   2nd   3rd   4th   5th   6th  

       terminating  

       troubleshooting packet signatures   2nd  

NetWare Link Services Protocol (NLSP)  

NetWare Loadable Module (NLM)  

NetWare Name Service (NSS)  

NetWare version 6

       LANs   2nd  

netwoks

       structured wiring   2nd  

               backbone cabling system   2nd   3rd   4th  

               horizontal cabling system   2nd   3rd  

               work area specification  

Network Address Translation (NAT)   2nd   3rd   4th   5th   6th   7th  

Network Attached Storage.   [See NAS]

Network Connection Policy   2nd  

Network Control Protocol (NCP)   2nd   3rd  

Network Driver Interface Specification (NDIS)   2nd  

Network File System (NFS)   2nd   3rd   4th   5th  

       configuring  

       daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       procedures   2nd   3rd   4th  

       RPC   2nd   3rd  

       server-side daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

       troubleshooting   2nd   3rd   4th  

       XDR   2nd  

Network Information Service (NIS)   2nd  

Network Information Service.   [See NIS]

Network Information System (NIS)   2nd  

Network Interface Card (NIC)  

network interface card.   [See NIC]

Network layer   2nd  

network management station (NMS)  

network operating system (NOS)  

Network Printer Server  

Network Virtual Terminal (NVT)   2nd  

Network-Node Interface (NNI)  

Networking Services dialog box   2nd  

networks

       10Base-2

               upgrading to 10Base-T networks   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  

       802.11b

               applying   2nd   3rd  

               distance limitations  

               firewalls   2nd  

       adapter cards   2nd  

       adapters

               troubleshooting  

       analyzers   2nd   3rd   4th   5th  

               decoding protocols  

               establishing baselines   2nd   3rd  

               filtering protocols   2nd  

               hardware   2nd   3rd  

               software   2nd   3rd   4th   5th   6th  

               software LAN   2nd   3rd  

               statistical data   2nd  

       Anixter  

       applications

               Linux/NetWare   2nd   3rd   4th  

       ARCnet   2nd  

               adapter cards   2nd  

               addressing   2nd   3rd   4th   5th   6th   7th   8th   9th  

               bus topologies   2nd  

               configuring   2nd  

               connecting to ethernets   2nd  

               star topologies   2nd  

               troubleshooting   2nd   3rd  

               wiring   2nd  

       auditing   2nd  

       back doors   2nd  

       backbones

               upgrading   2nd  

       Bluetooth.   [See Bluetooth]

       BOOTP   2nd  

               client/server exchanges (DHCP)   2nd   3rd   4th   5th   6th   7th   8th   9th  

               customizing DHCP   2nd   3rd   4th   5th  

               DHCP   2nd   3rd   4th   5th   6th   7th  

               downloading operating systems   2nd  

               options fields   2nd   3rd   4th   5th  

               packet formats   2nd   3rd   4th   5th  

               request/reply mechanisms   2nd   3rd   4th  

       broadband local area

               IEEE 802.7   2nd  

       broadcast storms   2nd  

       cable connectors

               10Base-2 networks   2nd  

       cabling   2nd  

       Cisco  

       configuring

               troubleshooting   2nd  

       congestion  

       connections

               different cables/topologies  

       connectors   2nd  

       devices  

       dial-up connections  

               configuring Windows Professional Client   2nd   3rd   4th   5th  

               optimizing   2nd  

               PPP (Point-to-Point Protocol)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  

               SLIP (Serial Line Internet Protocol)   2nd   3rd   4th   5th   6th   7th  

       directories

               interoperability   2nd  

               selecting   2nd  

       encryption  

               digital certificates   2nd   3rd   4th  

               SSL handshakes   2nd  

       ethernets

               backoff algorithm   2nd  

               buses, hubs, and switches   2nd   3rd  

               collisions   2nd   3rd   4th   5th   6th  

               history of   2nd   3rd  

       Ethernets

                phasing into Token-Ring networks   2nd   3rd   4th   5th   6th   7th  

               replacing Token-Ring equipment  

               routing   2nd  

       ethernets

               types of   2nd   3rd   4th   5th   6th   7th  

       Ethernets

               upgrading   2nd   3rd   4th  

       history of   2nd   3rd   4th  

       host systems

               troubleshooting   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  

       HP  

       IBM  

       IEEE 802.11g  

               increasing bandwidth   2nd  

       Juniper Networks, Inc.  

       LAN

               bridging topologies  

               building   2nd   3rd  

               bus topologies   2nd   3rd   4th  

               campus networks   2nd   3rd   4th  

               hybrid topologies   2nd   3rd  

               layer-3 switching  

               mesh topologies  

               nonshared/shared topologies   2nd   3rd  

               ring topologies   2nd   3rd  

               routing topologies   2nd  

               segmenting   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  

               star topologies   2nd  

               topologies   2nd  

               VLANs   2nd  

       LAN.   [See also LAN]

       laying out   2nd   3rd   4th   5th  

       LinkSys  

       logical network design

                components   2nd   3rd   4th   5th   6th   7th   8th   9th  

               maintaining  

               physical networks  

               planning   2nd   3rd   4th   5th   6th   7th  

       Micorsoft  

       monitoring   2nd  

       multi-tiered topologies   2nd   3rd   4th  

       multiple errors  

       NETGEAR  

       NetWarre

               printing  

       objects   2nd   3rd   4th   5th  

       OSI models   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       OSI Reference model

               TCP/IP   2nd   3rd   4th   5th   6th  

       piconets   2nd  

       ping command   2nd   3rd  

       protocols   2nd  

               adding stacks   2nd  

               Linux/NetWare  

       R-utilities  

               authorization   2nd   3rd  

               rcp   2nd   3rd  

               rlogin   2nd   3rd   4th   5th   6th   7th   8th  

               rsh   2nd   3rd   4th  

                ruptime command   2nd  

               rwho command   2nd  

       RedHat  

       reliability   2nd  

       routers

               Cisco   2nd   3rd   4th  

               configuring   2nd   3rd  

               connections   2nd   3rd  

               delegating LAN responsibilities   2nd   3rd  

               hierarchical network organizations   2nd  

               Internet   2nd  

               managing LAN sizes   2nd   3rd   4th   5th  

               NAT/packet filtering   2nd  

               ports   2nd   3rd   4th  

               protocols   2nd  

               security   2nd  

               selecting   2nd  

       SAN  

       SANs.   [See also SANs]

       scatternets   2nd  

       SCSI

               applying NAS and SANs   2nd  

               Arbitrated Loops (SANs)   2nd   3rd   4th   5th   6th   7th   8th   9th  

               capacity (NAS)   2nd   3rd   4th  

               connections   2nd  

               fabric switched topology (SANs)   2nd   3rd   4th   5th  

               Fibre Channel (SANs)   2nd   3rd   4th  

               IP (SANs)   2nd   3rd  

               mixed topologies (SANs)   2nd   3rd   4th  

               NAS   2nd  

               network appliances (NAS)   2nd  

               protocols (NAS)   2nd  

               SANs   2nd   3rd   4th  

       security   2nd   3rd  

               access control mechanisms   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

               auditing   2nd  

               delegating authority   2nd   3rd   4th   5th  

               disabling default options   2nd  

               firewalls   2nd  

               physical measures   2nd   3rd   4th   5th   6th   7th  

               policies   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  

               policies and procedures  

               services and system daemons   2nd  

       segments

               routers   2nd   3rd   4th   5th  

               switches   2nd   3rd  

       simple repeaters  

       Smaba.org  

       sniffers   2nd  

       SOHO   2nd  

                backups   2nd  

               requirements   2nd   3rd   4th   5th  

               topologies   2nd   3rd   4th  

               vertical-market applications   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       SOHO (Small Office and Home Office)

               troubleshooting  

       speed

               selecting NICs   2nd  

       switches   2nd   3rd  

               chassis  

                collapsed backbones   2nd   3rd   4th   5th  

               cut-through switches   2nd   3rd  

                full-duplex ethernet   2nd   3rd   4th  

               hardware types   2nd   3rd   4th  

               home offices   2nd  

               Layer 3 switches   2nd  

               managing  

               results  

               segmenting collison domains   2nd  

                stackable  

               store-and-forward switches   2nd  

               troubleshooting  

       testing

               BERT (Bit Rate Error Testers)   2nd  

               cable testers   2nd  

               cables   2nd   3rd  

               handheld cable checkers  

               impedance   2nd  

               pulse width  

               TDR (time domain reflectometer)   2nd   3rd  

               velocity   2nd  

       topologies

               troubleshooting  

       traceroute command   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th  

       traffic

               evaluating upgrades  

       troubleshooting   2nd   3rd   4th  

               auditing   2nd  

               documentation   2nd   3rd   4th   5th  

               maintenance   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

               problem resolution cycle   2nd   3rd   4th   5th   6th   7th   8th  

       Unix.   [See Unix]

       upgrading

               avoiding sidetracks   2nd  

               closing  

               deploying   2nd   3rd  

               determining needs for   2nd   3rd   4th   5th   6th   7th  

               documenting planning   2nd  

               executing pilot programs   2nd  

               maintaining support   2nd  

               mapping   2nd   3rd  

               measuring success   2nd  

               planning   2nd  

               restoring   2nd  

               scheduling downtime  

               setting goals  

                surveying users   2nd   3rd  

               testing   2nd   3rd   4th  

               tracking  

               training   2nd  

               verifying corporate standards   2nd  

       VLAN.   [See VLAN]

       VPN (virtual private network).   [See VPN]

       WAN

               routers   2nd  

       WANs (wide area networks)

               back doors   2nd  

               forged e-mail   2nd  

               passwords   2nd  

               preventing attacks   2nd   3rd  

               Trojan horses   2nd  

               viruses   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  

       wireless   2nd   3rd   4th  

               ad-hoc   2nd   3rd   4th  

               AMA  

               APs (access points)   2nd   3rd   4th   5th  

               connecting  

               HomeRF technology  

               IEEE  

               IEEE 802.11   2nd  

               IEEE 802.11;MAC layer   2nd   3rd   4th  

               IEEE 802.11;Physical layer   2nd   3rd  

               interference   2nd   3rd  

               PAN   2nd   3rd  

               public use of   2nd  

               radio wave transmission  

               security   2nd  

               selecting   2nd  

               spread-spectrum technology   2nd   3rd   4th  

               WAN (wide area network)   2nd   3rd   4th  

               Wi-Fi Alliance  

       wireless adapters

               installing   2nd   3rd   4th   5th   6th   7th   8th  

new features

       eDirectory   2nd   3rd   4th  

New Local Group dialog box  

New Object-Group dialog box  

New Object-User dialog box  

New Printer Detection dialog box  

new technology

       determining needs for network upgrades   2nd  

new top-level domains   2nd  

New User dialog box   2nd  

NEXT (near-end cross-talk)  

NEXT (Near-End Cross-Talk)   2nd  

NEXT (near-end cross-talk)  

Next Node Identification (NID)  

NFS (Network File System)   2nd   3rd   4th   5th  

       configuring  

       daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       procedures   2nd   3rd   4th  

       RPC   2nd   3rd  

       server-side daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

       troubleshooting   2nd   3rd   4th  

       XDR   2nd  

nfsstat command  

nfsstat s commands  

NIC

       Asset/Power Management components  

       autosensing   2nd  

       base I/O ports   2nd   3rd  

       connectors   2nd  

       hardware bus types

               selecting   2nd   3rd   4th   5th   6th   7th   8th   9th  

       information

               searching  

       IRQ (Interrupt ReQuest Line)   2nd   3rd   4th  

       load balancing   2nd  

       multi- homed systems   2nd  

       Remote Wake-Up component   2nd   3rd   4th   5th  

       software drivers  

               NDIS (Network Driver Interface Specification)   2nd  

               ODI (Open Data-Link Interface)   2nd  

               Packet Drivers   2nd  

       troubleshooting   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

               Linux configurations   2nd   3rd  

       WfM (Wired for Management)   2nd  

               Universal Network Boot  

       WOL (Wake on LAN)   2nd  

               Universal Network Boot  

       WOL-compliant network cards   2nd  

NIC (network interface card)  

NIC (Network Interface Card)  

NID (Next Node Identification)  

NIS (Network Information Service)   2nd   3rd   4th  

        clients  

       domainname command   2nd  

       maps   2nd   3rd   4th   5th  

               modifying   2nd  

       master/slave servers  

       slaves   2nd   3rd  

       starting   2nd   3rd  

       yp commands   2nd  

       ypserve daemon  

NIS (Network Information System)   2nd  

NIST (National Institute of Standards and Technology)  

NLM (NetWare Loadable Module)  

NLSP (NetWare Link Services Protocol)  

NMS (network management station)  

NNI (Network-Node Interface)  

nodes

       5-4-3 rule   2nd  

       hidden  

       ring topologies  

noise

       testing  

nominial velocity of propogation  

non-authenticated commands   2nd  

non-maskable interrupts  

non-microsoft clients

       Samba   2nd   3rd  

nonbraodcast multiple access (NBMA)  

nonshared topologies   2nd   3rd  

nonvoliatile memory (NVRAM)  

NOOP command   2nd  

North American Digital Hierarchy  

Norton Internet Security 2003  

NOS (network operating system)  

notification of delivery   2nd  

notifying users of network upgrades   2nd  

Novell

       connection-oriented services   2nd  

       connectionless services   2nd  

       directory structures   2nd  

               Bindery   2nd  

               Bindery Services   2nd   3rd   4th   5th  

               comparing Bindery/NDS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               configuring NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th  

               NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th  

       IPX (Internetwork Packet Exchange)   2nd  

               packets   2nd   3rd  

       NCP

               independence   2nd   3rd   4th  

       NCP (NetWare Core Protocol)   2nd  

               packet signatures   2nd  

               signature options   2nd   3rd   4th   5th   6th  

               troubleshooting packet signatures   2nd  

       protocols   2nd   3rd   4th   5th  

       security  

               AUDITCON/SYSCON utilites   2nd   3rd   4th   5th   6th  

Novell Advanced Audit Service (NAAS)  

Novell Core Protocol (NCP)  

Novell Directory Service  

Novell Directory Service (NDS)  

Novell Directory Service (NDS).   [See also NetWare]

Novell Directory Services (NDS)  

Novell Netware

       migrating to Windows NT 4.0/2000   2nd   3rd  

               CSNW   2nd   3rd   4th  

               GSNW   2nd   3rd   4th   5th   6th   7th  

               SFN   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th  

NPRINTER.NLM   2nd  

nslookup command   2nd   3rd  

nslookup utility   2nd  

NSS (NetWare Name Service)  

NTBugTraq   2nd  

NTFS

       permissions  

               Windows NT  

null packet  

numbers

       options  

       ports

               filtering   2nd   3rd   4th  

numerical reply codes, FTP  

NVRAM (nonvoliatile memory)  

NVT (Network Virtual Terminal)   2nd  

NWADMN32 utility   2nd   3rd  

Категории