Upgrading and Repairing Networks (5th Edition)
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
p-node clients PAC (data packet frames ) PAC (Packet) pac command 2nd Packet (PAC) Packet Drivers 2nd Packet Exchange Protocol (PXP) packet filtering packet filters 2nd intrusion detection (dynamic packet filters) 2nd Packet Header field packets Bluetooth 2nd 3rd 4th BOOTP 2nd 3rd 4th 5th Configure-Request DHCP 2nd 3rd 4th 5th DHCPINFORM ethernets 802.2 LLC standard 2nd 3rd 4th 5th 802.3 standard Ethernet II/PARC 2nd 3rd frames 2nd filtering 2nd 3rd routers 2nd IPX (Internetwork Packet Exchange) 2nd type assignments 2nd 3rd magic 2nd 3rd NCP (NetWare Core Protocol) signature options 2nd PAC signature NCP (NetWare Core Protocol) 2nd troubleshooting 2nd signature levels 2nd SPX (Sequenced Packet Exchange) 2nd WOL-compliant network cards 2nd padding IP (Internet Protocol) page messages Palm PDAs Palo Alto Research Center (PARC) PAM (Password Authentication Manager) PAN (personal area network) 2nd 3rd 4th panels patches 2nd 3rd 4th paper documentation 2nd PAR (Project Authorization Request) parameters -debug -nobsd -nofork passwords Windwos NT 2nd 3rd Unix PARC 2nd 3rd PARC (Palo Alto Research Center) paritioning Active Directory 2nd parity checks park mode partial mesh topologies partial synchronization 2nd partitioning NDS Manager 2nd partitions NetWare partners servers adding pass-through authentication passband technologies passive hubs 2nd 3rd 4th 5th ARCnet 2nd passive open connections password Authentication Manager (PAM) passwords 2nd 3rd 4th clear-text construction guidelines 2nd grabbers 2nd interdomain trust relationships 2nd 3rd 4th creating 2nd 3rd 4th 5th policies 2nd 3rd account lockouts expirations history lists managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th smart cards 2nd synchronizing 2nd 3rd 4th tracking Unix shadow password files 2nd Windows NT 2nd 3rd detecting failed logon attempts 2nd 3rd patches panels 2nd 3rd 4th fiber optic Pathworks patterns hopping Payload Type (PT) PC cards PCF (Point Coordination Function) PCI bus 2nd 3rd PCI (Peripheral Component Interconnect) PCL (Printer Control Language) PCL.SEP PCMCIA bus 2nd PCONSOLE Bindery utility PCS (Physical Coding Sublayer) PDA (personal digital assistant) PDAs (Personal Digital Assistants) 2nd PDC (Primary Domain Controller) PDCs upgrading 2nd 3rd 4th 5th PDCs (primary domain controllers) PDU (protocol Data Unit) peer-to-peer networking models domains performance cables 2nd NAS Peripheral Component Interconnect (PCI) permanent virtual connection (PVC) permissions cumulative effects of Linux 2nd 3rd 4th 5th 6th 7th 8th 9th NetWare 2nd comparing NDS/file system rights configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th Everyone group 2nd file system rights 2nd inheritance of rights 2nd 3rd 4th object/property rights 2nd 3rd 4th trustees NTFS Windows NT SGID (Set Group ID) 2nd 3rd 4th 5th share-level 2nd Windows 95/98 2nd Windows NT SUID (Set User ID) 2nd 3rd 4th 5th Unix 2nd 3rd 4th 5th 6th 7th 8th 9th user-level 2nd Windows NT/2000 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th personal area network (PAN) 2nd 3rd 4th personal digital assistant (PDA) Personal Digital Assistants (PDAs) 2nd Personal Information Managers (PIMs) personnel, network upgrades 2nd PGP (Pretty Good Privacy) 2nd 3rd 4th phasing Ethernets into Token-Ring networks 2nd 3rd 4th 5th 6th 7th PHY (Physical layer) Phyoical Layer Physical Coding Sublayer (PCS) physical connections routers 2nd 3rd 4th physical inteface cards (PICs) Physical layer Physical Layer ATM IEEE 802 2nd Physical layer IEEE 802.11 standards 2nd 3rd Physical layer (PHY) Physical layers physical measures (network security) disposing of hardware and media 2nd locking the door 2nd UPS (Uninterruptable Power Supply) 2nd Physical Media Dependent (PMD) Physical Medium Dependent (PMD) physical networks planning physical topologies 2nd physical topology Piano piconets 2nd 3rd Bluetooth 2nd 3rd 4th 5th PICs (physical interface cards) PID (process ID) pilot programs executing 2nd PIMs (Personal Information Managers) ping command 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th Ping of Death 2nd Ping utility piracy pitfalls of troubleshooting 2nd 3rd Plain Old Telephone Service (POTS) planning components 2nd 3rd 4th 5th 6th 7th tetsing 2nd disaster recovery logical network design 2nd 3rd 4th 5th 6th 7th maintenance migration arranging domains 2nd centralized/decentralized management 2nd 3rd domain controllers 2nd 3rd implemeting to Active Directories 2nd 3rd 4th joining trees maste domain model 2nd 3rd 4th 5th member servers 2nd 3rd modeling directories 2nd 3rd namespaces 2nd upgrading BDCs 2nd upgrading PDCs 2nd 3rd 4th 5th network upgrades 2nd 3rd 4th 5th 6th 7th maintaining support 2nd surveying users 2nd 3rd networks avoiding sidetracks 2nd closing deploying 2nd 3rd documenting upgrades 2nd executing pilot programs 2nd measuring success 2nd restoring 2nd scheduling downtime setting goals testing 2nd 3rd 4th training 2nd upgrades 2nd upgrading 2nd 3rd verifying corporate standards 2nd physical networks upgrading 2nd 3rd 4th 5th PLOGI (Port Login) 2nd plugs 2nd PMD (Physical Media Dependent) PMD (Physical Medium Dependent) Pocket PCs Point Coordination Function (PCF) point-to-point connections leased lines 2nd 3rd Fractional T1 T-carrier system 2nd 3rd 4th troubleshooting T-carrier system 2nd 3rd 4th 5th Point-to-Point Protocol (PPP) 2nd 3rd 4th 5th 6th 7th LCP (Link Control Protocol) establishing 2nd 3rd 4th 5th 6th NCP (Network Control Protocol) establishing 2nd Windwos 2000 Professional Client configuring 2nd 3rd 4th 5th policies 2nd 3rd 4th auditing configuring Windows 2000/2003 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th configuring Windows NT 4.0 2nd 3rd 4th 5th 6th 7th passwords managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th security 2nd acceptable use statements 2nd 3rd 4th 5th elements to include 2nd 3rd 4th escalation procedures 2nd 3rd guidelines for usage 2nd Network Connection Policy 2nd passwords 2nd poll packet pools printers POP3 (Post Office Protocol) 2nd AUTHORIZATION state 2nd TRANSACTION state 2nd UPDATE state Port Login (PLOGI) 2nd ports back doors base I/O 2nd 3rd filtering 2nd 3rd 4th FTP (File Transfer Protocol) 2nd identifiers IP addresses numbers routers 2nd 3rd 4th switches UDP 2nd 3rd 4th uplink VLAN (virtual LAN) 2nd Windows NT selecting 2nd portsw TCP 2nd 3rd 4th Positive Completion replies Positive Intermediate replies Post Office Protocol (POP3) 2nd AUTHORIZATION state 2nd TRANSACTION state 2nd UPDATE state post-implementation reviews networks upgrades PostScript POTS (Plain Old Telephone Service) power SOHO (Small Office and Home Office) troubleshooting 2nd 3rd power conditioning 2nd 3rd 4th 5th ACPI (Advanced Configuration and Power Interface) 2nd 3rd 4th network devices Power Management component Power SUM PPP frames RFCs PPP (Point-to-Point Protocol) 2nd 3rd 4th 5th 6th 7th LCP (Link Control Protocol) establishing 2nd 3rd 4th 5th 6th NCP (Network Control Protocol) establishing 2nd Windows 2000 Professional Client configuring 2nd 3rd 4th 5th PPTP (Point-to-Point Protocol) VPN (virtual private network) 2nd 3rd pr command PRBS (pseudorandom binary sequence) Preboot Execution Environment (PXE) predefined groups Presentation layer Pretty Good Privacy (PGP) 2nd 3rd 4th preventative maintenance NIC (network interface card) preventing down time 2nd network congestion 2nd 3rd prevention attacks WANs (wide area networks) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th of attacks digital certificates 2nd 3rd preventive maintenance backups 2nd 3rd 4th 5th 6th 7th media 2nd 3rd 4th 5th off-site storage 2nd 3rd rotation schedules 2nd disaster recovery documenting 2nd network monitoring 2nd redundancy routine 2nd UPS (uninterruptible power supply) 2nd 3rd 4th 5th ACPI (Advanced Configuration and Power Interface) 2nd 3rd 4th network devices preventive security measures 2nd 3rd host computers 2nd routers 2nd training 2nd Tripwire 2nd 3rd updating 2nd virus-checking applications Primary Domain Controller (PDC) primary domain controllers (PDCs) Primary Domain Controllers. [See PDCs] primary servers 2nd 3rd 4th 5th 6th 7th 8th 9th primitives 2nd SNMP (Simple Network Management Protocol) 2nd print Operators group Print Server properties 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Printer Control Language (PCL) Printer Properties 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Windows 2000 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th Printer Server Properties Windows 2000 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th printers auditing enabling 2nd events 2nd naming searching 2nd sharing 2nd Linux/NetWare 2nd Web browsers managing printers 2nd 3rd Windows NT managing 2nd printing FORTRAN hardware-based print servers 2nd 3rd 4th IPP 2nd 3rd languages 2nd NetWare 2nd 3rd 4th NPRINTER.NLM 2nd Print Queue object properties 2nd Print Server object properties 2nd Printer object properties 2nd 3rd PSERVER.NLM 2nd print server applications 2nd 3rd 4th protocols 2nd BSD (Berkeley System Distribution) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th IPP 2nd 3rd 4th 5th 6th 7th TCP/IP 2nd statistics 2nd Unix SVR4 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th Windows 2000 adding printers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st Windows print servers adding printers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th printers/printing devices 2nd 3rd 4th Windows XP Professional 2nd 3rd 4th 5th 6th 7th 8th 9th PrintQueue object privacy 2nd 3rd private keys SSL handshakes 2nd privileges. [See also rights] privlieges administrative rights problem resolution cycle 2nd 3rd 4th 5th 6th 7th 8th procedures 2nd 3rd 4th NFS 2nd 3rd 4th security 2nd troubleshooting process ID (PID) process of elimination , troubleshooting 2nd 3rd processes FTP (File Transfer Protocol) 2nd profiles Bluetooth 2nd 3rd 4th Cordless Telephony 2nd Dial-Up Networking Generic Access 2nd 3rd Headset 2nd Intercom 2nd Serial Port Service Discovery Application 2nd users 2nd programming directory-aware application 2nd Project Authorization Request (PAR) projects plans promiscuous mode 2nd properties Bindery Document 2nd 3rd 4th 5th 6th 7th 8th 9th 10th FTP MMC configuring 2nd MMC (Microsoft Management Console) 2nd 3rd 4th 5th NetWare rights 2nd 3rd 4th 5th 6th Print Queue object properties 2nd Print Server 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Print Server object properties 2nd Printer 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Printer object properties 2nd 3rd property data sets Bindery property set attribute propogation nominal velocity of proprietary protocols NetWare 2nd 3rd 4th 5th proprietary protocols. [See also protocols] protection passwords 2nd protection. [See also security] protocols 2nd analyzers 2nd 3rd decoding protocols establsihing baselines 2nd 3rd filtering protocols 2nd hardware 2nd 3rd software 2nd 3rd 4th 5th 6th software LAN 2nd 3rd statistical data 2nd ARP (Address Resolution Protocol) 2nd Bluetooth BOOTP 2nd client/server exchanges (DHCP) 2nd 3rd 4th 5th 6th 7th 8th 9th DHCP 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th downloading operating systems 2nd options fields 2nd 3rd 4th 5th packet formats 2nd 3rd 4th 5th relay agents 2nd 3rd request/reply mechanisms 2nd 3rd 4th support BOOTP (Bootstrap protocol) BSD (Berkeley System Distribution) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th configuring routers 2nd DAP (Directory Access Protocol) DECnet DHCP allocation APIPA 2nd authorizing servers 2nd 3rd BOOTP 2nd 3rd 4th 5th 6th 7th BOOTP support client/server exchanges 2nd 3rd 4th 5th 6th 7th 8th 9th clustering 2nd configuring 2nd 3rd 4th customizing 2nd 3rd 4th 5th daemons 2nd 3rd DNS 2nd 3rd 4th 5th 6th exclusions/ reservations 2nd installing servers 2nd 3rd large/routed environments leasing servers managing logging 2nd 3rd MMC Action menu 2nd 3rd 4th 5th 6th 7th 8th Red Hat Linux 2nd relay agents 2nd 3rd 4th troubleshooting DHCP (Dynamic Host Configuration Protocol) 2nd 3rd DISP (Directory Information Shadowing Protocol) DOP (Directory Operational Binding Management Protocol) DSP (Directory System Protocol) EGP (Exterior Gateway Protocols) 2nd file servers 2nd 3rd filtering 2nd 3rd FTP firewalls 2nd FTP (File Transfer Protocol) 2nd 3rd commands 2nd 3rd 4th 5th data transfers 2nd 3rd 4th ports/processes 2nd Red Hat Linux 2nd 3rd 4th 5th 6th replies 2nd 3rd 4th 5th TFTP (Trivial File Transfer Protocol) 2nd 3rd 4th 5th Windows command-line clients 2nd 3rd 4th 5th 6th 7th 8th 9th FTP. [See also FTP] HELLO HTTP 2nd 3rd header fields ICMP (Internet Control Message Protocol) 2nd 3rd message types 2nd 3rd 4th 5th IDP (Internet Datagram Protocol) IGMP (Internet Group Management Protocol) IGP (Interior Gateway Protocols) 2nd IMAP4 2nd 3rd client commands 2nd commands 2nd 3rd 4th data formatting 2nd mailbox naming 2nd states system flags 2nd universal commands IP Fibre Channel SANs 2nd 3rd IP (Internet Protocol) addressing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st ARP (Address Resolution Protocol) 2nd 3rd 4th 5th 6th 7th 8th 9th connections 2nd datagram headers 2nd 3rd 4th 5th 6th 7th implementing 2nd proxy ARP (Address Resolution Protocol) 2nd RARP (Reverse Address Resolution Protocol) subnetting 2nd 3rd 4th 5th 6th 7th 8th supernetting 2nd 3rd 4th 5th 6th unacknowledged protocol unreliable protocol IPCP (Internet Protocol Control Protocol) IPP 2nd 3rd IPP (Internet Printing Protocol) installing object types operations 2nd 3rd Version 1.1 2nd Windows 2000 IPv6 comparing to IPv4 2nd 3rd extension headers 2nd 3rd headers 2nd 3rd 4th Options Type field IPX (Internetwork Packet Exchange) 2nd frames 2nd packets 2nd 3rd 4th 5th IPXCP (Internetwork Packet Exchange Control Protocol) ISAKMP (Internet Security Association and Key Management Protocol) L2CAP (Logical Link Control Adaption Protocol) LAN 2nd LCP (Link Control Protocol) 2nd 3rd 4th 5th 6th 7th LDAP 2nd 3rd 4th 5th binding requests 2nd comparing databases 2nd directories interoperability between directories 2nd metadirectories modifying databases searching databases 2nd selecting directories 2nd X.500 2nd 3rd 4th 5th 6th 7th 8th 9th LDAP (Lightweight Directory Access Protocol) 2nd limitations Linux/NetWare LMP (Link Manager Protocol) lpr/lpd Mount 2nd 3rd 4th 5th 6th multi-protocol label switching 2nd 3rd name resolution hardware comparisons 2nd NAS 2nd NCP (NetWare Core Protocol) 2nd 3rd 4th 5th burst mode packet signatures 2nd requests/responses 2nd 3rd 4th signature options 2nd 3rd 4th 5th 6th terminating troubleshooting packet signatures 2nd NCP (Network Control Protocol) 2nd 3rd NetWare 2nd 3rd 4th 5th NetWare version 6 LANs 2nd NFS NFS (Network File System) 2nd configuring daemons 2nd 3rd 4th 5th 6th 7th 8th 9th 10th procedures 2nd 3rd 4th RPC 2nd 3rd server-side daemons 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th troubleshooting 2nd 3rd 4th XDR 2nd OBEX (object exchange protocol) OSI (Open Systems Interconnection) POP3 (Post Office Protocol) 2nd AUTHORIZATION state 2nd TRANSACTION state 2nd UPDATE state PPP RFCs PPP (Point-to-Point Protocol) 2nd 3rd 4th 5th 6th 7th configuring Windows 2000 Professional Client 2nd 3rd 4th 5th establishing LCP 2nd 3rd 4th 5th 6th establishing NCP 2nd RARP RARP (Reverse Address Resolution Protocol) RIP (Routing Information Protocol) 2nd 3rd 4th 5th 6th router updates 2nd 3rd 4th scalability 2nd version 2 2nd 3rd RMON 2nd RMON (Remote Monitoring Protocol) routers 2nd 3rd routing types of 2nd SAP (Service Advertising Protocol) SDP (Service Discovery Protocol) selecting 2nd SLIP (Serial Line Internet Protocol) 2nd 3rd 4th 5th 6th 7th SMB 2nd 3rd 4th 5th SMB (Server Message Block) CIFS 2nd 3rd files 2nd 3rd 4th 5th 6th 7th 8th negotiation 2nd NET commands 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th Samba 2nd 3rd SMB. [See also SMB] SMTP (Simple Mail Transfer Protocol) 2nd 3rd 4th 5th 6th commands 2nd 3rd 4th 5th extensions models 2nd 3rd 4th response codes 2nd 3rd 4th 5th transactions 2nd SNMP 2nd SNMP (Simple Network Management Protocol) 2nd 3rd MIB (Management Information Base) 2nd 3rd 4th 5th primitives 2nd proxy agents 2nd RMON (Remote Monitoring) 2nd 3rd 4th 5th SNMPv2/SNMPv3 2nd 3rd SNMP (Simple Network Monitoring Protocol) Spanning Tree SPX (Sequenced Packet Exchange) 2nd communications 2nd packets 2nd SPXII 2nd stacks 2nd adding 2nd stateful stateless TCP LANs 2nd TCP (Transmission Control Protocol) configuring sessions 2nd 3rd connections ending sessions 2nd headers 2nd 3rd 4th managing sessions 2nd 3rd 4th 5th 6th 7th 8th 9th security 2nd sessions 2nd TCP/IP name resolution 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th OSI Reference model 2nd 3rd 4th 5th 6th Unix 2nd TCS (Telephony Control Protocol) Telnet 2nd authentication 2nd 3rd commands 2nd 3rd 4th 5th 6th 7th 8th NVT (Network Virtual Terminal) 2nd TFTP (Trivial File Transfer Protocol) 2nd 3rd 4th 5th TKIP UDP UDP (User Datagram Protocol) 2nd 3rd headers ICMP interaction UNIX 2nd 3rd 4th 5th BOOTP 2nd 3rd 4th 5th 6th DHCP 2nd 3rd 4th 5th 6th FTP 2nd 3rd 4th TCP/IP 2nd 3rd telnet 2nd Telnetxxx 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th VLAN (virtual LAN) 2nd VPN (virtual private network) 2nd AH 2nd 3rd ESP 2nd 3rd 4th IKE 2nd IPSec 2nd L2TP 2nd 3rd 4th 5th 6th PPTP 2nd 3rd WAN 2nd wireless selecting 2nd WTRP XPP (Xerox Packet Protocols) protocols Data Unit (PDU) providing services Linux/NetWare 2nd 3rd proxy agents 2nd proxy applications 2nd 3rd 4th proxy ARP (Address Resolution Protocol) 2nd proxy servers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th Proxy Settings dialog box 2nd PSCRIPT.SEP PSERVER.NLM 2nd 3rd pseudorandom binary sequence (PRBS) PSTN 2nd 3rd PSTN (public switched telephone network) PSTN (Public Switched Telephone Network) PSTN (public switched telephone network) 2nd 3rd PT (Payload Type) Public group. [See also Everyone group] public key encryption 2nd 3rd 4th 5th 6th 7th 8th RSA public key encryption 2nd public keys SSL handshakes 2nd public switched telephone network (PSTN) Public Switched Telephone Network (PSTN) public switched telephone network (PSTN) 2nd 3rd public use of 802.11b networking 2nd publications IEEE standards pulling records pulse width, configuring purchasing switches VLAN (virtual LAN) 2nd 3rd pushing records PVC (permanent virtual connection) PXE (Preboot Execution Environment) PXP (Packet Exchange Protocol)
|