Upgrading and Repairing Networks (5th Edition)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

p-node clients  

PAC (data packet frames )  

PAC (Packet)  

pac command   2nd  

Packet (PAC)  

Packet Drivers   2nd  

Packet Exchange Protocol (PXP)  

packet filtering  

packet filters   2nd  

       intrusion detection (dynamic packet filters)   2nd  

Packet Header field  

packets

       Bluetooth   2nd   3rd   4th  

       BOOTP   2nd   3rd   4th   5th  

       Configure-Request  

       DHCP   2nd   3rd   4th   5th  

       DHCPINFORM  

        ethernets

               802.2 LLC standard   2nd   3rd   4th   5th  

               802.3 standard  

               Ethernet II/PARC   2nd   3rd  

               frames   2nd  

       filtering   2nd   3rd  

               routers   2nd  

       IPX (Internetwork Packet Exchange)   2nd  

               type assignments   2nd   3rd  

       magic   2nd   3rd  

       NCP (NetWare Core Protocol)

               signature options   2nd  

       PAC  

       signature

               NCP (NetWare Core Protocol)   2nd  

               troubleshooting   2nd  

       signature levels   2nd  

       SPX (Sequenced Packet Exchange)   2nd  

       WOL-compliant network cards   2nd  

padding

       IP (Internet Protocol)  

page messages  

Palm PDAs  

Palo Alto Research Center (PARC)  

PAM (Password Authentication Manager)  

PAN (personal area network)   2nd   3rd   4th  

panels

       patches   2nd   3rd   4th  

paper documentation   2nd  

PAR (Project Authorization Request)  

parameters

       -debug  

       -nobsd  

       -nofork  

       passwords

               Windwos NT   2nd   3rd  

       Unix  

PARC   2nd   3rd  

PARC (Palo Alto Research Center)  

paritioning

       Active Directory   2nd  

parity checks  

park mode  

partial mesh topologies  

partial synchronization   2nd  

partitioning

       NDS Manager   2nd  

partitions

       NetWare  

partners

       servers

               adding  

pass-through authentication  

passband technologies  

passive hubs   2nd   3rd   4th   5th  

       ARCnet   2nd  

passive open connections  

password Authentication Manager (PAM)  

passwords   2nd   3rd   4th  

       clear-text  

       construction guidelines   2nd  

       grabbers   2nd  

       interdomain trust relationships   2nd   3rd   4th  

               creating   2nd   3rd   4th   5th  

       policies   2nd   3rd  

               account lockouts  

               expirations  

               history lists  

               managing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       smart cards   2nd  

       synchronizing   2nd   3rd   4th  

       tracking  

       Unix

               shadow password files   2nd  

       Windows NT   2nd   3rd  

               detecting failed logon attempts   2nd   3rd  

patches

       panels   2nd   3rd   4th  

               fiber optic  

Pathworks  

patterns

        hopping  

Payload Type (PT)  

PC cards  

PCF (Point Coordination Function)  

PCI

       bus   2nd   3rd  

PCI (Peripheral Component Interconnect)  

PCL (Printer Control Language)  

PCL.SEP  

PCMCIA

       bus   2nd  

PCONSOLE Bindery utility  

PCS (Physical Coding Sublayer)  

PDA (personal digital assistant)  

PDAs (Personal Digital Assistants)   2nd  

PDC (Primary Domain Controller)  

PDCs

       upgrading   2nd   3rd   4th   5th  

PDCs (primary domain controllers)  

PDU (protocol Data Unit)  

peer-to-peer networking models

       domains  

performance

       cables   2nd  

       NAS  

Peripheral Component Interconnect (PCI)  

permanent virtual connection (PVC)  

permissions

       cumulative effects of  

       Linux   2nd   3rd   4th   5th   6th   7th   8th   9th  

       NetWare   2nd  

               comparing NDS/file system rights  

               configuring   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  

               Everyone group   2nd  

               file system rights   2nd  

               inheritance of rights   2nd   3rd   4th  

               object/property rights   2nd   3rd   4th  

               trustees  

       NTFS  

               Windows NT  

       SGID (Set Group ID)   2nd   3rd   4th   5th  

       share-level   2nd  

               Windows 95/98   2nd  

               Windows NT  

       SUID (Set User ID)   2nd   3rd   4th   5th  

       Unix   2nd   3rd   4th   5th   6th   7th   8th   9th  

       user-level   2nd  

               Windows NT/2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

personal area network (PAN)   2nd   3rd   4th  

personal digital assistant (PDA)  

Personal Digital Assistants (PDAs)   2nd  

Personal Information Managers (PIMs)  

personnel, network upgrades   2nd  

PGP (Pretty Good Privacy)   2nd   3rd   4th  

phasing Ethernets into Token-Ring networks   2nd   3rd   4th   5th   6th   7th  

PHY (Physical layer)  

Phyoical Layer  

Physical Coding Sublayer (PCS)  

physical connections

       routers   2nd   3rd   4th  

physical inteface cards (PICs)  

Physical layer  

Physical Layer

       ATM  

       IEEE 802   2nd  

Physical layer

       IEEE 802.11 standards   2nd   3rd  

Physical layer (PHY)  

Physical layers  

physical measures (network security)  

       disposing of hardware and media   2nd  

       locking the door   2nd  

       UPS (Uninterruptable Power Supply)   2nd  

Physical Media Dependent (PMD)  

Physical Medium Dependent (PMD)  

physical networks

       planning  

physical topologies   2nd  

physical topology  

Piano  

piconets   2nd   3rd  

       Bluetooth   2nd   3rd   4th   5th  

PICs (physical interface cards)  

PID (process ID)  

pilot programs

       executing   2nd  

PIMs (Personal Information Managers)  

ping command   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

Ping of Death   2nd  

Ping utility  

piracy  

pitfalls of troubleshooting   2nd   3rd  

Plain Old Telephone Service (POTS)  

planning

        components   2nd   3rd   4th   5th   6th   7th  

               tetsing   2nd  

       disaster recovery  

       logical network design   2nd   3rd   4th   5th   6th   7th  

       maintenance  

       migration

               arranging domains   2nd  

               centralized/decentralized management   2nd   3rd  

               domain controllers   2nd   3rd  

               implemeting to Active Directories   2nd   3rd   4th  

               joining trees  

               maste domain model   2nd   3rd   4th   5th  

               member servers   2nd   3rd  

               modeling directories   2nd   3rd  

               namespaces   2nd  

               upgrading BDCs   2nd  

               upgrading PDCs   2nd   3rd   4th   5th  

       network upgrades   2nd   3rd   4th   5th   6th   7th  

               maintaining support   2nd  

                surveying users   2nd   3rd  

       networks

               avoiding sidetracks   2nd  

               closing  

               deploying   2nd   3rd  

               documenting upgrades   2nd  

               executing pilot programs   2nd  

               measuring success   2nd  

               restoring   2nd  

               scheduling downtime  

               setting goals  

               testing   2nd   3rd   4th  

               training   2nd  

               upgrades   2nd  

               upgrading   2nd   3rd  

               verifying corporate standards   2nd  

       physical networks  

       upgrading   2nd   3rd   4th   5th  

PLOGI (Port Login)   2nd  

plugs   2nd  

PMD (Physical Media Dependent)  

PMD (Physical Medium Dependent)  

Pocket PCs  

Point Coordination Function (PCF)  

point-to-point connections

       leased lines   2nd   3rd  

               Fractional T1  

               T-carrier system   2nd   3rd   4th  

               troubleshooting T-carrier system   2nd   3rd   4th   5th  

Point-to-Point Protocol (PPP)   2nd   3rd   4th   5th   6th   7th  

       LCP (Link Control Protocol)

               establishing   2nd   3rd   4th   5th   6th  

       NCP (Network Control Protocol)

               establishing   2nd  

       Windwos 2000 Professional Client

               configuring   2nd   3rd   4th   5th  

policies   2nd   3rd   4th  

       auditing

               configuring Windows 2000/2003   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  

               configuring Windows NT 4.0   2nd   3rd   4th   5th   6th   7th  

       passwords  

               managing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       security   2nd  

               acceptable use statements   2nd   3rd   4th   5th  

               elements to include   2nd   3rd   4th  

               escalation procedures   2nd   3rd  

               guidelines for usage   2nd  

               Network Connection Policy   2nd  

               passwords   2nd  

poll packet  

pools

       printers  

POP3 (Post Office Protocol)   2nd  

       AUTHORIZATION state   2nd  

       TRANSACTION state   2nd  

       UPDATE state  

Port Login (PLOGI)   2nd  

ports

       back doors  

       base I/O   2nd   3rd  

       filtering   2nd   3rd   4th  

       FTP (File Transfer Protocol)   2nd  

       identifiers  

       IP addresses  

        numbers  

       routers   2nd   3rd   4th  

       switches  

       UDP   2nd   3rd   4th  

       uplink  

       VLAN (virtual LAN)   2nd  

       Windows NT

               selecting   2nd  

portsw

       TCP   2nd   3rd   4th  

Positive Completion replies  

Positive Intermediate replies  

Post Office Protocol (POP3)   2nd  

       AUTHORIZATION state   2nd  

       TRANSACTION state   2nd  

       UPDATE state  

post-implementation reviews

       networks upgrades  

PostScript  

POTS (Plain Old Telephone Service)  

power

       SOHO (Small Office and Home Office)

               troubleshooting   2nd   3rd  

power conditioning   2nd   3rd   4th   5th  

       ACPI (Advanced Configuration and Power Interface)   2nd   3rd   4th  

       network devices  

Power Management component  

Power SUM  

PPP

       frames  

       RFCs  

PPP (Point-to-Point Protocol)   2nd   3rd   4th   5th   6th   7th  

       LCP (Link Control Protocol)

               establishing   2nd   3rd   4th   5th   6th  

       NCP (Network Control Protocol)

               establishing   2nd  

       Windows 2000 Professional Client

               configuring   2nd   3rd   4th   5th  

PPTP (Point-to-Point Protocol)

       VPN (virtual private network)   2nd   3rd  

pr command  

PRBS (pseudorandom binary sequence)  

Preboot Execution Environment (PXE)  

predefined groups  

Presentation layer  

Pretty Good Privacy (PGP)   2nd   3rd   4th  

preventative maintenance

       NIC (network interface card)  

preventing

       down time   2nd  

       network congestion   2nd   3rd  

prevention

       attacks

               WANs (wide area networks)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th  

       of attacks

               digital certificates   2nd   3rd  

preventive maintenance

        backups   2nd   3rd   4th   5th   6th   7th  

               media   2nd   3rd   4th   5th  

               off-site storage   2nd   3rd  

               rotation schedules   2nd  

       disaster recovery  

       documenting   2nd  

       network monitoring   2nd  

       redundancy  

       routine   2nd  

       UPS (uninterruptible power supply)   2nd   3rd   4th   5th  

               ACPI (Advanced Configuration and Power Interface)   2nd   3rd   4th  

               network devices  

preventive security measures   2nd   3rd  

       host computers   2nd  

       routers   2nd  

       training   2nd  

       Tripwire   2nd   3rd  

       updating   2nd  

       virus-checking applications  

Primary Domain Controller (PDC)  

primary domain controllers (PDCs)  

Primary Domain Controllers.   [See PDCs]

primary servers   2nd   3rd   4th   5th   6th   7th   8th   9th  

primitives   2nd  

       SNMP (Simple Network Management Protocol)   2nd  

print Operators group  

Print Server

       properties   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

Printer Control Language (PCL)  

Printer Properties   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       Windows 2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

Printer Server Properties

       Windows 2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

printers

       auditing

               enabling   2nd  

       events   2nd  

       naming  

       searching   2nd  

       sharing   2nd  

               Linux/NetWare   2nd  

       Web browsers

               managing printers   2nd   3rd  

       Windows NT

               managing   2nd  

printing

       FORTRAN  

       hardware-based print servers   2nd   3rd   4th  

       IPP   2nd   3rd  

       languages   2nd  

       NetWare   2nd   3rd   4th  

               NPRINTER.NLM   2nd  

               Print Queue object properties   2nd  

               Print Server object properties   2nd  

               Printer object properties   2nd   3rd  

               PSERVER.NLM   2nd  

       print server applications   2nd   3rd   4th  

       protocols   2nd  

               BSD (Berkeley System Distribution)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th  

               IPP   2nd   3rd   4th   5th   6th   7th  

               TCP/IP   2nd  

       statistics   2nd  

       Unix

               SVR4   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       Windows 2000

               adding printers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  

       Windows print servers

               adding printers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  

               printers/printing devices   2nd   3rd   4th  

       Windows XP Professional   2nd   3rd   4th   5th   6th   7th   8th   9th  

PrintQueue object  

privacy   2nd   3rd  

private keys

       SSL handshakes   2nd  

privileges.   [See also rights]

privlieges

       administrative rights  

problem resolution cycle   2nd   3rd   4th   5th   6th   7th   8th  

procedures   2nd   3rd   4th  

       NFS   2nd   3rd   4th  

       security   2nd  

       troubleshooting  

process ID (PID)  

process of elimination , troubleshooting   2nd   3rd  

processes

       FTP (File Transfer Protocol)   2nd  

profiles  

       Bluetooth   2nd   3rd   4th  

               Cordless Telephony   2nd  

               Dial-Up Networking  

               Generic Access   2nd   3rd  

               Headset   2nd  

               Intercom   2nd  

               Serial Port  

               Service Discovery Application   2nd  

       users   2nd  

programming

       directory-aware application   2nd  

Project Authorization Request (PAR)  

projects

       plans  

promiscuous mode   2nd  

properties  

       Bindery  

       Document   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       FTP  

       MMC

               configuring   2nd  

       MMC (Microsoft Management Console)   2nd   3rd   4th   5th  

       NetWare

               rights   2nd   3rd   4th   5th   6th  

       Print Queue object properties   2nd  

       Print Server   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       Print Server object properties   2nd  

       Printer   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       Printer object properties   2nd   3rd  

property data sets

       Bindery  

property set attribute  

propogation

       nominal velocity of  

proprietary protocols

       NetWare   2nd   3rd   4th   5th  

proprietary protocols.   [See also protocols]

protection

       passwords   2nd  

protection.   [See also security]

protocols   2nd  

       analyzers   2nd   3rd  

               decoding protocols  

               establsihing baselines   2nd   3rd  

               filtering protocols   2nd  

               hardware   2nd   3rd  

               software   2nd   3rd   4th   5th   6th  

               software LAN   2nd   3rd  

               statistical data   2nd  

       ARP (Address Resolution Protocol)   2nd  

       Bluetooth  

       BOOTP   2nd  

               client/server exchanges (DHCP)   2nd   3rd   4th   5th   6th   7th   8th   9th  

               DHCP   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

               downloading operating systems   2nd  

               options fields   2nd   3rd   4th   5th  

               packet formats   2nd   3rd   4th   5th  

               relay agents   2nd   3rd  

               request/reply mechanisms   2nd   3rd   4th  

               support  

       BOOTP (Bootstrap protocol)  

       BSD (Berkeley System Distribution)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th  

       configuring routers   2nd  

       DAP (Directory Access Protocol)  

       DECnet  

       DHCP

               allocation  

               APIPA   2nd  

               authorizing servers   2nd   3rd  

               BOOTP   2nd   3rd   4th   5th   6th   7th  

               BOOTP support  

               client/server exchanges   2nd   3rd   4th   5th   6th   7th   8th   9th  

               clustering   2nd  

               configuring   2nd   3rd   4th  

               customizing   2nd   3rd   4th   5th  

               daemons   2nd   3rd  

               DNS   2nd   3rd   4th   5th   6th  

               exclusions/ reservations   2nd  

               installing servers   2nd   3rd  

               large/routed environments  

               leasing servers  

               managing logging   2nd   3rd  

               MMC Action menu   2nd   3rd   4th   5th   6th   7th   8th  

               Red Hat Linux   2nd  

               relay agents   2nd   3rd   4th  

               troubleshooting  

       DHCP (Dynamic Host Configuration Protocol)   2nd   3rd  

       DISP (Directory Information Shadowing Protocol)  

       DOP (Directory Operational Binding Management Protocol)  

       DSP (Directory System Protocol)  

       EGP (Exterior Gateway Protocols)   2nd  

       file servers   2nd   3rd  

       filtering   2nd   3rd  

       FTP  

               firewalls   2nd  

       FTP (File Transfer Protocol)   2nd   3rd  

               commands   2nd   3rd   4th   5th  

               data transfers   2nd   3rd   4th  

               ports/processes   2nd  

               Red Hat Linux   2nd   3rd   4th   5th   6th  

               replies   2nd   3rd   4th   5th  

               TFTP (Trivial File Transfer Protocol)   2nd   3rd   4th   5th  

               Windows command-line clients   2nd   3rd   4th   5th   6th   7th   8th   9th  

       FTP.   [See also FTP]

       HELLO  

       HTTP   2nd   3rd  

               header fields  

       ICMP (Internet Control Message Protocol)   2nd   3rd  

               message types   2nd   3rd   4th   5th  

       IDP (Internet Datagram Protocol)  

       IGMP (Internet Group Management Protocol)  

       IGP (Interior Gateway Protocols)   2nd  

       IMAP4   2nd   3rd  

               client commands   2nd  

               commands   2nd   3rd   4th  

               data formatting   2nd  

               mailbox naming   2nd  

               states  

               system flags   2nd  

               universal commands  

       IP  

               Fibre Channel  

               SANs   2nd   3rd  

       IP (Internet Protocol)  

               addressing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  

               ARP (Address Resolution Protocol)   2nd   3rd   4th   5th   6th   7th   8th   9th  

               connections   2nd  

               datagram headers   2nd   3rd   4th   5th   6th   7th  

               implementing   2nd  

               proxy ARP (Address Resolution Protocol)   2nd  

               RARP (Reverse Address Resolution Protocol)  

               subnetting   2nd   3rd   4th   5th   6th   7th   8th  

               supernetting   2nd   3rd   4th   5th   6th  

                unacknowledged protocol  

               unreliable protocol  

       IPCP (Internet Protocol Control Protocol)  

       IPP   2nd   3rd  

       IPP (Internet Printing Protocol)

               installing  

               object types  

               operations   2nd   3rd  

               Version 1.1   2nd  

               Windows 2000  

       IPv6  

               comparing to IPv4   2nd   3rd  

               extension headers   2nd   3rd  

               headers   2nd   3rd   4th  

               Options Type field  

       IPX (Internetwork Packet Exchange)   2nd  

               frames   2nd  

               packets   2nd   3rd   4th   5th  

       IPXCP (Internetwork Packet Exchange Control Protocol)  

       ISAKMP (Internet Security Association and Key Management Protocol)  

       L2CAP (Logical Link Control Adaption Protocol)  

       LAN   2nd  

       LCP (Link Control Protocol)   2nd   3rd   4th   5th   6th   7th  

       LDAP   2nd   3rd   4th   5th  

               binding requests   2nd  

               comparing databases   2nd  

               directories  

               interoperability between directories   2nd  

                metadirectories  

               modifying databases  

               searching databases   2nd  

               selecting directories   2nd  

               X.500   2nd   3rd   4th   5th   6th   7th   8th   9th  

       LDAP (Lightweight Directory Access Protocol)   2nd  

       limitations  

       Linux/NetWare  

       LMP (Link Manager Protocol)  

       lpr/lpd  

       Mount   2nd   3rd   4th   5th   6th  

       multi-protocol label switching   2nd   3rd  

        name resolution

               hardware comparisons   2nd  

       NAS   2nd  

       NCP (NetWare Core Protocol)   2nd   3rd   4th   5th  

               burst mode  

               packet signatures   2nd  

               requests/responses   2nd   3rd   4th  

               signature options   2nd   3rd   4th   5th   6th  

               terminating  

               troubleshooting packet signatures   2nd  

       NCP (Network Control Protocol)   2nd   3rd  

       NetWare   2nd   3rd   4th   5th  

       NetWare version 6

               LANs   2nd  

       NFS  

       NFS (Network File System)   2nd  

               configuring  

               daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

               procedures   2nd   3rd   4th  

               RPC   2nd   3rd  

               server-side daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

               troubleshooting   2nd   3rd   4th  

               XDR   2nd  

       OBEX (object exchange protocol)  

       OSI (Open Systems Interconnection)  

       POP3 (Post Office Protocol)   2nd  

               AUTHORIZATION state   2nd  

               TRANSACTION state   2nd  

               UPDATE state  

       PPP

               RFCs  

       PPP (Point-to-Point Protocol)   2nd   3rd   4th   5th   6th   7th  

               configuring Windows 2000 Professional Client   2nd   3rd   4th   5th  

               establishing LCP   2nd   3rd   4th   5th   6th  

               establishing NCP   2nd  

       RARP  

       RARP (Reverse Address Resolution Protocol)  

       RIP (Routing Information Protocol)   2nd   3rd   4th   5th   6th  

               router updates   2nd   3rd   4th  

               scalability   2nd  

               version 2   2nd   3rd  

       RMON   2nd  

       RMON (Remote Monitoring Protocol)  

       routers   2nd   3rd  

       routing

               types of   2nd  

       SAP (Service Advertising Protocol)  

       SDP (Service Discovery Protocol)  

       selecting   2nd  

       SLIP (Serial Line Internet Protocol)   2nd   3rd   4th   5th   6th   7th  

       SMB   2nd   3rd   4th   5th  

       SMB (Server Message Block)

               CIFS   2nd   3rd  

               files   2nd   3rd   4th   5th   6th   7th   8th  

               negotiation   2nd  

               NET commands   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               Samba   2nd   3rd  

       SMB.   [See also SMB]

       SMTP (Simple Mail Transfer Protocol)   2nd   3rd   4th   5th   6th  

               commands   2nd   3rd   4th   5th  

               extensions  

               models   2nd   3rd   4th  

               response codes   2nd   3rd   4th   5th  

               transactions   2nd  

       SNMP   2nd  

       SNMP (Simple Network Management Protocol)   2nd   3rd  

               MIB (Management Information Base)   2nd   3rd   4th   5th  

               primitives   2nd  

               proxy agents   2nd  

               RMON (Remote Monitoring)   2nd   3rd   4th   5th  

               SNMPv2/SNMPv3   2nd   3rd  

       SNMP (Simple Network Monitoring Protocol)  

       Spanning Tree  

       SPX (Sequenced Packet Exchange)   2nd  

               communications   2nd  

               packets   2nd  

               SPXII   2nd  

       stacks   2nd  

               adding   2nd  

       stateful  

       stateless  

       TCP  

               LANs   2nd  

       TCP (Transmission Control Protocol)  

               configuring sessions   2nd   3rd  

               connections  

               ending sessions   2nd  

               headers   2nd   3rd   4th  

               managing sessions   2nd   3rd   4th   5th   6th   7th   8th   9th  

               security   2nd  

               sessions   2nd  

       TCP/IP

               name resolution   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th  

               OSI Reference model   2nd   3rd   4th   5th   6th  

               Unix   2nd  

       TCS (Telephony Control Protocol)  

       Telnet   2nd  

               authentication   2nd   3rd  

               commands   2nd   3rd   4th   5th   6th   7th   8th  

               NVT (Network Virtual Terminal)   2nd  

       TFTP (Trivial File Transfer Protocol)   2nd   3rd   4th   5th  

       TKIP  

       UDP  

       UDP (User Datagram Protocol)   2nd   3rd  

               headers  

               ICMP interaction  

       UNIX   2nd   3rd   4th   5th  

               BOOTP   2nd   3rd   4th   5th   6th  

               DHCP   2nd   3rd   4th   5th   6th  

               FTP   2nd   3rd   4th  

               TCP/IP   2nd   3rd  

               telnet   2nd  

               Telnetxxx   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

       VLAN (virtual LAN)   2nd  

       VPN (virtual private network)   2nd  

               AH   2nd   3rd  

               ESP   2nd   3rd   4th  

               IKE   2nd  

               IPSec   2nd  

               L2TP   2nd   3rd   4th   5th   6th  

               PPTP   2nd   3rd  

       WAN   2nd  

       wireless

               selecting   2nd  

       WTRP  

       XPP (Xerox Packet Protocols)  

protocols Data Unit (PDU)  

providing

       services

               Linux/NetWare   2nd   3rd  

proxy agents   2nd  

proxy applications   2nd   3rd   4th  

proxy ARP (Address Resolution Protocol)   2nd  

proxy servers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  

Proxy Settings dialog box   2nd  

PSCRIPT.SEP  

PSERVER.NLM   2nd   3rd  

pseudorandom binary sequence (PRBS)  

PSTN   2nd   3rd  

PSTN (public switched telephone network)  

PSTN (Public Switched Telephone Network)  

PSTN (public switched telephone network)   2nd   3rd  

PT (Payload Type)  

Public group.   [See also Everyone group]

public key encryption   2nd   3rd   4th   5th   6th   7th   8th  

       RSA public key encryption   2nd  

public keys

       SSL handshakes   2nd  

public switched telephone network (PSTN)  

Public Switched Telephone Network (PSTN)  

public switched telephone network (PSTN)   2nd   3rd  

public use of 802.11b networking   2nd  

publications

       IEEE standards  

pulling

       records  

pulse width, configuring  

purchasing

       switches

               VLAN (virtual LAN)   2nd   3rd  

pushing

       records  

PVC (permanent virtual connection)  

PXE (Preboot Execution Environment)  

PXP (Packet Exchange Protocol)  

Категории