Upgrading and Repairing Networks (5th Edition)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

T-carrier systems   2nd   3rd   4th  

       troubleshooting   2nd   3rd   4th   5th  

tables

       OSPF (Open Shortest Path First)   2nd  

               LSDB (Link State Database)   2nd   3rd   4th   5th  

               route calculations  

tagging

       explicit

               VLAN (virtual LAN)   2nd   3rd   4th   5th  

       implicit

               VLAN (virtual LAN)   2nd  

tags

       client commands   2nd  

tape backups   2nd   3rd   4th   5th  

taps

       bridges  

TC (Transmission Convergence)  

TCP

       connectivity

               ping command   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

               traceroute command   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th  

               troubleshooting  

       host system

               checking configurations   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  

       LANs   2nd  

        names

               troubleshooting   2nd   3rd  

       ports   2nd   3rd   4th  

TCP (Transmission Control Protocol)   2nd   3rd  

       connections  

       headers   2nd   3rd   4th  

       sessions   2nd  

               configuring   2nd   3rd  

               ending   2nd  

               managing   2nd   3rd   4th   5th   6th   7th   8th   9th  

               security   2nd  

TCP/IP

       applications   2nd   3rd  

       commands   2nd   3rd  

       finger utility   2nd   3rd   4th   5th  

       FTP (File Transfer Protocol)   2nd   3rd  

               commands   2nd   3rd   4th   5th  

               data transfers   2nd   3rd   4th  

               ports/processes   2nd  

               Red hat Linux   2nd   3rd   4th   5th   6th  

               replies   2nd   3rd   4th   5th  

               TFTP (Trivial File Transfer Protocol)   2nd   3rd   4th   5th  

               Windows command-line clients   2nd   3rd   4th   5th   6th   7th   8th   9th  

        name resolution   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th  

       NetWare  

       OSI (Open Systems Interconnect) Reference model   2nd   3rd   4th   5th   6th  

       Secure Shell (SSH) utilities   2nd  

       selecting   2nd  

       services   2nd   3rd  

       SYN flooding   2nd  

       Telnet   2nd  

               authentication   2nd   3rd  

               commands   2nd   3rd   4th   5th   6th   7th   8th  

               NVT (Network Virtual Terminal)   2nd  

       UDP ( User Datagram Protocol)   2nd  

       Unix   2nd   3rd  

TCP/IP (Transmission Control Protocol)

       Unix   2nd  

tcpdump command   2nd   3rd   4th   5th  

TCS (Telephony Control Protocol)  

TCU (International Telecommunications Union)  

TDE (time-division multiplexed)   2nd  

TDR (time domain reflectometer)   2nd   3rd  

TDR (time domain reflectometry)   2nd  

team structures

       creating  

teams , network upgrades   2nd  

tech support

       SOHO (Small Office and Home Office)

               troubleshooting   2nd  

technical project plans  

telecommunications

       rooms   2nd   3rd   4th   5th   6th   7th   8th   9th  

Telecommunications Industry Association (TIA)   2nd  

telecommunications rooms  

telecommunications.

       connections

               wiring   [See also cabling]

Telephony Control Protocol (TCS)  

telephony control protocol specification group  

Telnet   2nd  

telnet  

Telnet  

       authentication   2nd   3rd  

       commands   2nd   3rd   4th   5th   6th   7th   8th  

       firewalls   2nd  

       managing   2nd   3rd   4th  

       NVT (Network Virtual Terminal)   2nd  

       Recovery  

telnet

       SFU (Services for Unix)

               NFS  

       Unix   2nd  

Telnetxxx   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

Temporal Key Integrity Protocol (TKIP)  

temporary workgroups  

terminal roles  

termination

       NCP  

terminations

       cabling  

               crimping  

               fiber optic   2nd   3rd  

               IDC  

               modular jacks /plugs   2nd  

               outlet configuration   2nd   3rd  

               patch panels   2nd   3rd   4th  

               patch panels (fiber optic)  

               splicing fiber optic   2nd   3rd  

terminators

       active hubs  

       NIC (network interface card)   2nd  

testing   2nd  

       analyzers   2nd   3rd  

               decoding protocols  

               establishing baselines   2nd   3rd  

               filtering protocols   2nd  

               hardware   2nd   3rd  

               software   2nd   3rd   4th   5th   6th  

               software LAN   2nd   3rd  

               statistical data   2nd  

       firewalls  

       networks  

               BERT (Bit Rate Error Testers)   2nd  

               cable testers   2nd  

               cables   2nd   3rd  

               handheld cable checkers  

               impedance   2nd  

               pulse width  

               TDR (time domain reflectometer)   2nd   3rd  

               velocity   2nd  

       pilot programs

               executing   2nd  

       ping command   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       traceroute command   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th  

       upgrades   2nd   3rd   4th  

TFN (Tribe Flood Network)  

TFN2K (Tribe Flood Network 2000)  

TFTP (Trivial File Transfer Protocol)   2nd   3rd   4th   5th  

tftp (trivial FTP server)  

the CodeWeavers Web site  

The User Environment Profile dialog box  

third generation (3G) mobile phones   2nd  

threats  

three-way handshakes  

three-way handshakes.   [See also connections]

throughput

       ARCnet   2nd  

               addressing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               bus topologies   2nd  

               connecting ot ethernets   2nd  

               network adapter cards   2nd  

               star topologies   2nd  

               troubleshooting   2nd   3rd  

               wiring   2nd  

TIA (Telecommunications Industry Association)   2nd  

TID (Tree ID)  

time

       user access

               limiting   2nd  

time domain reflectometer (TDR)   2nd   3rd  

time domain reflectometry (TDR)   2nd  

Time to live (TTL)  

time-division multiplexed (TDE)   2nd  

Time-To-Live (TTL)   2nd   3rd  

timing network upgrades   2nd   3rd   4th   5th   6th   7th  

tips  

TKIP (Temporal Key Integrity Protocol)  

tlntadmn command  

TLS

       eDirectory  

token frames  

token-passing bus access method   2nd  

Token-Ring

       access methods   2nd  

       ARCnet

               laying out   2nd   3rd   4th   5th  

               troubleshooting   2nd   3rd  

               upgrading   2nd   3rd   4th  

       replacing   2nd  

Token-Ring networks

       adapter cards  

       collisions  

       Ethernets

                phasing into   2nd   3rd   4th   5th   6th   7th  

               replacing Token-Ring equipment  

               routing   2nd  

               upgrading   2nd   3rd   4th  

token-rings

       frames   2nd  

tombstone  

tools

       Administration Tools

               installing   2nd  

       AUDITCON   2nd   3rd   4th   5th   6th  

       BERT (Bit Rate Error Testers)   2nd  

       cable testers   2nd  

       documentation

               online/paper   2nd  

               speadsheets/word processors   2nd   3rd   4th  

       Event Viewer   2nd  

       finger   2nd   3rd   4th   5th  

       handheld cable checkers  

       impedance   2nd  

       import/export  

       iPrint (NetWare)   2nd  

       Linux GUI

               managing users   2nd   3rd   4th   5th   6th   7th   8th   9th  

       MMC (Microsoft Management Console)  

               Action menu   2nd  

               computer management   2nd   3rd   4th   5th   6th  

               properties   2nd   3rd   4th   5th  

               User Manager   2nd   3rd  

       network sniffers   2nd  

       nslookup   2nd  

       NWADMN32   2nd   3rd  

       PCONSOLE  

       ping command   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       pulse width  

       R-utilities  

               authorization   2nd   3rd  

               rcp   2nd   3rd  

               rlogin   2nd   3rd   4th   5th   6th   7th   8th  

               rsh   2nd   3rd   4th  

                ruptime command   2nd  

               rwho command   2nd  

       Secure Shell (SSH)   2nd  

       SYSCON   2nd   3rd   4th   5th   6th  

       syslog

               Linux/Unix   2nd   3rd   4th   5th   6th   7th  

       TDR (time domain reflectometer)   2nd   3rd  

       testing cables   2nd   3rd  

       traceroute command   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th  

       Tripwire   2nd   3rd  

       User Manager   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       velocity   2nd  

top-level domains   2nd  

topologies

       ARCnet   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

       bus   2nd   3rd   4th   5th  

               ARCnet   2nd  

       campus networks   2nd   3rd   4th  

       connections

               using different topologies  

       ethernets

               restrictions   2nd   3rd   4th   5th   6th  

       hybrid LAN   2nd   3rd  

       LAN   2nd  

               bridging  

               builsing   2nd   3rd  

               bus   2nd   3rd   4th  

               hybrids   2nd   3rd  

               layer-3 switching  

               mesh  

               nonshared/shared   2nd   3rd  

               ring   2nd   3rd  

               routing   2nd  

               star   2nd  

               VLANs   2nd  

       limitations  

       multi-tiered networks   2nd   3rd   4th  

       NAS  

       physical networks  

       SANs   2nd   3rd   4th  

               applying NAS   2nd  

               Arbitrated Loops   2nd   3rd   4th   5th   6th   7th   8th   9th  

               fabric switched topology   2nd   3rd   4th   5th  

               Fibre Channel   2nd   3rd   4th  

               IP   2nd   3rd  

               mixed topologies   2nd   3rd   4th  

       separating  

       SOHO   2nd   3rd   4th  

       star   2nd   3rd   4th   5th   6th   7th  

               ARCnet   2nd  

       troubleshooting  

       VLAN (virtual LAN)   2nd   3rd   4th  

topologocal differences, DSL and cable modems   2nd   3rd   4th   5th  

total internal reflection

       fiber-optic cables  

TPC (Transfer Parameter Commands)  

traceroute command   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th  

tracking

       passwords  

       user accounts  

tracking progress of network upgrades  

traffic

       analyzers   2nd   3rd  

               decoding protocols  

               establishing baselines   2nd   3rd  

               filtering protocols   2nd  

               hardware   2nd   3rd  

               software   2nd   3rd   4th   5th   6th  

               software LAN   2nd   3rd  

               statistical data   2nd  

       assessing   2nd  

       Gigabit Ethernets   2nd  

       networks

               evaluating upgrades  

traffic congestion

       switches   2nd   3rd  

training  

       network upgrades  

       security   2nd  

       users

               upgrades   2nd  

TRANSACTION state   2nd  

transactions

       security of  

       SMTP (Simple Mail Transfer Protocol)   2nd  

Transfer Parameter Commands (TPC)  

transfers

       Arbitrated Loops  

       ASCII  

       data formatting (IMAP4)   2nd  

       FTP (File Transfer Protocol)   2nd   3rd  

               commands   2nd   3rd   4th   5th  

               data transfers   2nd   3rd   4th  

               ports/processes   2nd  

               Red Hat Linux   2nd   3rd   4th   5th   6th  

               replies   2nd   3rd   4th   5th  

               TFTP (Trivial File Transfer Protocol)   2nd   3rd   4th   5th  

               Windows command-line clients   2nd   3rd   4th   5th   6th   7th   8th   9th  

Transient Negative Completion replies  

translation devices

       Ethernets/Token-Ring networks  

transmission

       ARCnet   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

       devices  

Transmission Control Protocol (TCP)   2nd  

       connections  

       headers   2nd   3rd   4th  

       sessions   2nd  

               configuring   2nd   3rd  

               ending   2nd  

               managing   2nd   3rd   4th   5th   6th   7th   8th   9th  

               security   2nd  

Transmission Control Protocol/Internet Control.   [See TCP/IP]2nd   [See TCP/IP]

Transmission Convergence (TC)  

transparent proxy servers  

Transport layer   2nd  

transport mode  

transportation

       Ethernets/Token-Ring networks   2nd   3rd  

       IP (Internet Protocol)   2nd  

transports

       Fibre Channel   2nd   3rd   4th  

Tree ID (TID)  

tree topologies   2nd  

trees   2nd  

       Active Directory   2nd   3rd   4th  

       joining  

       NDS objects   2nd   3rd   4th   5th   6th  

Tribe Flood Network (TFN)  

Tribe Flood Network 2000 (TFN2K)  

triggered RIP  

triggers

       capture  

triple-DES (Data Encryption Standard)  

trivial FTP server (tftp)  

troff command  

Trojan horses   2nd   3rd   4th   5th  

Trojan horses.   [See also virues]

troublehsooting

       failed login attempts   2nd   3rd  

troubleshooting  

       ARCnet   2nd   3rd  

               Eternet   2nd   3rd  

               Token-Ring   2nd   3rd  

       auditing   2nd  

       congestions   2nd   3rd  

       connectivity  

               ping command   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

               traceroute command   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th  

       DHCP  

       disaster recovery  

       documentation   2nd   3rd   4th   5th   6th   7th  

               maintenance   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       ethernets   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  

       frame relay   2nd   3rd  

       frames   2nd  

       jost systems   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  

       LDAP   2nd  

       link lights   2nd   3rd  

       logon  

        logons   2nd  

       name resolution   2nd   3rd  

       NAS  

       NET STATISTICS COMMAND   2nd   3rd   4th  

       NET USE COMMAND   2nd   3rd  

       NET VIEW COMMAND   2nd   3rd  

       networks

               backups   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

               monitoring   2nd  

               off-site storage   2nd   3rd  

               rotation schedules   2nd  

               sniffers   2nd  

       NFS   2nd   3rd   4th  

       NIC (network interface card)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

               Linux configurations   2nd   3rd  

       packet signature conflicts   2nd  

       pitfalls of   2nd   3rd  

       planning resources  

       problem resolution cycle   2nd   3rd   4th   5th   6th   7th   8th  

       procedures  

       process of elimination   2nd   3rd  

       redundancy  

       routine maintenance   2nd  

       single-key encryption   2nd  

       SOHO (Small Office and Home Office)  

               cables   2nd  

                components   2nd  

               configuring computers   2nd   3rd   4th   5th   6th   7th   8th  

               firewalls   2nd  

               networks  

               power   2nd   3rd  

               tech support   2nd  

               wireless networks   2nd  

       switches  

       synchronization   2nd  

       T-carrier systems   2nd   3rd   4th   5th  

       TCP/IP

               commands   2nd   3rd  

       Unix

               login   2nd   3rd  

       upgrades   2nd   3rd   4th  

       UPS (uninterruptible power supply)   2nd   3rd   4th   5th  

               ACPI (Advanced Configuration and Power Interface)   2nd   3rd   4th  

               network devices  

       viruses   2nd   3rd  

       wireless networking   2nd   3rd  

       wiring

               terminologies  

troueblshooting

       firewalls   2nd  

trouebshooting

       FCS  

Truncated Binary Exponential Backoff Algorithm  

trust relationships

       Active Directory   2nd  

               managing  

               partitioning   2nd  

       two-way transitive  

Trust Relationships dialog box  

Trusted Domains dialog box  

trustees

       NetWare   2nd  

Trusting Domains list  

trusts

       complete trust   2nd  

       interdomain relationships   2nd   3rd   4th  

               creating   2nd   3rd   4th   5th  

       relationships

               local domain groups  

TTL (Time to Live)  

TTL (Time-To-Live)   2nd   3rd  

tunnel mode  

tunneling

       VPN (virtual private network)   2nd  

TURN command  

twisted pair cabling   2nd   3rd   4th   5th   6th  

twisted-pair wiring.   [See also 10Base-T networks]

two-way synchronization sessions

       MSDSS   2nd  

two-way transitive trust relationship  

two-way transitive trust relationships  

Type field  

type of service, IP (Internet Protocol)  

types

       cables   2nd   3rd   4th  

               performance comparison   2nd  

               twisted pair   2nd   3rd   4th   5th   6th  

       collisions  

       frames

               IPX (Internetwork Packet Exchange)   2nd  

       hardware switches   2nd   3rd   4th  

               chassis  

               cut-through switches   2nd   3rd  

               home offices   2nd  

               Layer 3 switches   2nd  

                stackable  

               store-and-forward switches   2nd  

       ICMP messages   2nd   3rd   4th   5th  

       objects

               IPP (Internet Printing Protocol)  

       of attacks  

               denial-of-service   2nd  

               distributed denial-of-service   2nd   3rd   4th  

               forged e-mail   2nd  

               ICMP redirects   2nd   3rd  

               Ping of Death   2nd  

       of backups   2nd   3rd   4th   5th  

       of encryption   2nd  

               public key encryption   2nd   3rd   4th  

               RSA public key encryption   2nd  

               single-key encryption   2nd   3rd   4th  

       of ethernet   2nd   3rd   4th   5th   6th   7th  

       of hubs

               ARCnet   2nd  

       of packets  

       packets

               IPX (Internetwork Packet Exchange)   2nd   3rd  

       routing protocols   2nd  

       SCSI  

       SMB (Server Message Block)   2nd   3rd  

Категории