Upgrading and Repairing Networks (5th Edition)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

UAWG (Universal ADSL Working Group )  

UDP

       ports   2nd   3rd   4th  

UDP ( User Datagram Protocol)   2nd  

       headers  

       ICMP interaction  

       TCP/IP   2nd  

UIDs (Unique Identifiers)  

unacknowledged protocols

       IP (Internet Protocol)  

UNI (User-Network Interface)   2nd  

unicast addresses  

UNICODE  

Uniform Resource Identifier (URI)  

Uniform Resource Locator (URL)  

Uninterruptable Power Supply.   [See UPS]2nd   [See UPS]

uninterruptible power supply.   [See UPS]

Unique Identifiers (UIDs)  

universal ADSL  

Universal ADSL Working Group (UAWG)  

universal commands  

universal groups  

Universal Network Boot  

universal serial bus (USB)  

Unix

       auditing   2nd   3rd   4th  

               syslog   2nd   3rd   4th   5th   6th   7th  

               system log files   2nd   3rd  

       commands  

       DNS servers

               configuration   2nd  

       eDirectory  

       ifconfig command   2nd   3rd   4th   5th  

       login

               troubleshooting   2nd   3rd  

       monitoring   2nd   3rd   4th  

               syslog   2nd   3rd   4th   5th   6th   7th  

               system log files   2nd   3rd  

       netstat command   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  

       NFS   2nd  

       NFS (Network File System)   2nd  

               configuring  

               daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

               procedures   2nd   3rd   4th  

               RPC   2nd   3rd  

               server-side daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

               troubleshooting   2nd   3rd   4th  

               XDR   2nd  

       NIS (Network Information Service)   2nd  

       NIS (Network Information System)   2nd  

       permissions

               viewing   2nd  

       printers

               configuring   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th  

               SVR4   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

UNIX

       protocols   2nd   3rd   4th   5th  

               BOOTP   2nd   3rd   4th   5th   6th  

               DHCP   2nd   3rd   4th   5th   6th  

               TCP/IP   2nd   3rd  

               telnet   2nd   3rd   4th   5th   6th  

               Telnetxxx   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

Unix

       r-commands  

       SAMBA   2nd  

       SFU (Services for Unix 3.0)   2nd   3rd  

               ActiveState ActivePerl 5.6  

               installing   2nd   3rd   4th   5th  

               Korn Shell commands   2nd   3rd   4th   5th  

               password synchronization   2nd   3rd   4th  

               Telnet   2nd   3rd   4th  

               user name mapping   2nd  

       SFU (Services for Unix)

               Korn Shell commands   2nd  

               telnet  

       SOHO   2nd   3rd  

       TCP/IP   2nd  

       users   2nd   3rd   4th   5th   6th   7th   8th   9th  

               /etc/groups file   2nd  

               /etc/passwd file   2nd   3rd   4th   5th  

               administration   2nd  

               modifying accounts   2nd   3rd   4th  

               shadow password file   2nd  

UNIX

       utilities   2nd   3rd   4th   5th  

               BOOTP   2nd   3rd   4th   5th   6th  

               DHCP   2nd   3rd   4th   5th   6th  

               FTP   2nd   3rd   4th  

               TCP/IP   2nd   3rd  

               telnet   2nd  

               TelnetXXX   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

unreliable protocols

       IP (Internet Protocol)  

update sequence numbers (USNs)  

UPDATE state  

updates

       routers   2nd   3rd   4th  

updating

       DHCP

               configuring dynamic updates   2nd   3rd   4th  

       security   2nd  

upgrading

       10Base-2 networks

               10Base-T networks   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  

       applications   2nd   3rd   4th   5th  

       ARCnet

               Eternet   2nd  

               Ethernet   2nd   3rd   4th  

               Token-Ring   2nd   3rd   4th  

       BDCs (Backup Domain Controllers)   2nd  

       bridges to routers and switches   2nd   3rd   4th   5th   6th   7th   8th  

               addressing issues   2nd  

               management issues  

               network protocol issues   2nd  

       Ethernets   2nd   3rd   4th  

                phasing into Token-Ring networks   2nd   3rd   4th   5th   6th   7th  

               replacing Token-Ring equipment  

               routing   2nd  

       fiber- optic cables  

       networks

               avoiding sidetracks   2nd  

               closing  

               deploying   2nd   3rd  

               determining needs for   2nd   3rd   4th   5th   6th   7th  

               documenting planning   2nd  

               executing pilot programs   2nd  

               maintaining support   2nd  

               mapping   2nd   3rd  

               measuring success   2nd  

                notifying users   2nd  

               optimizing   2nd   3rd  

               planning   2nd   3rd   4th   5th  

               restoring   2nd  

               scheduling downtime  

                surveying users   2nd   3rd  

               testing   2nd   3rd   4th  

               tracking  

               training   2nd  

               verifying corporate standards   2nd  

               verifying;setting goals  

       operating systems   2nd   3rd   4th   5th  

       PDCs (Primary Domain Controllers)   2nd   3rd   4th   5th  

       Windows 2000 Server   2nd   3rd  

       Windows 2003 Server   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th  

uplink ports  

UPS   2nd  

UPS (Uninterruptable Power Supply)

       as physical network security measure   2nd  

UPS (uninterruptible power supply)   2nd   3rd   4th   5th  

       ACPI (Advanced Configuration and Power Interface)   2nd   3rd   4th  

       network devices  

URI   2nd   3rd   4th   5th  

URI (Uniform Resource Identifier)  

URL   2nd   3rd   4th   5th  

URL (Uniform Resource Locator)  

URN   2nd   3rd   4th   5th  

USB (universal serial bus)  

user accounts   2nd   3rd  

       delegating authority for network security   2nd  

       tracking  

User Datagram Protocol (UDP)   2nd   3rd  

       headers  

       ICMP interaction  

       TCP/IP   2nd  

User Environment Profile dialog box  

user identification

       network security measures   2nd   3rd  

               passwords   2nd   3rd   4th   5th   6th   7th  

User Manager   2nd   3rd  

User Manager utility   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

User object  

user-level permissions   2nd  

       Windows NT/2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

User-Network Interface (UNI)   2nd  

useradd command

       Unix  

usernames

       interdomain trust relaitonships   2nd   3rd   4th  

               creating   2nd   3rd   4th   5th  

       tracking   2nd  

users

       accounts

               Account Information dialog box   2nd   3rd   4th   5th  

               complete trusts models   2nd  

               creating trust relationships   2nd   3rd   4th   5th  

               interdomain trust relationships   2nd   3rd   4th  

               managing   2nd   3rd   4th   5th  

               moving between Linux/NetWare   2nd   3rd  

               searching   2nd   3rd  

               Windows NT   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       assigning  

       authentication

               Linux/NetWare  

       complaints

               determining needs for network upgrades  

       Domain Admins groups  

       domaind

               creating   2nd   3rd  

       global catalog   2nd  

       grouping

               modeling directories   2nd   3rd  

       groups

               creating   2nd  

               Windows 2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       Linux   2nd   3rd   4th   5th   6th   7th   8th   9th  

       Linux GUI utility

               managing   2nd   3rd   4th   5th   6th   7th   8th   9th  

        names

               mapping   2nd  

       pass-through authentication  

       profiles   2nd  

       surveying   2nd   3rd  

       time

               limiting   2nd  

       training   2nd  

       Unix   2nd   3rd   4th   5th   6th   7th   8th   9th  

               /etc/groups file   2nd  

               /etc/passwd/ file   2nd   3rd   4th   5th  

               administration   2nd  

               modifying accounts   2nd   3rd   4th  

               shadow password file   2nd  

       upgrades

               notifying   2nd  

       Windows NT

               adding to groups   2nd  

               assigning group memberships   2nd  

               built-in user groups   2nd   3rd  

               creating groups   2nd   3rd  

               groups   2nd  

               managing accounts   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       workstations

               limiting   2nd  

using vertical-market software  

USNs (update sequence numbers)  

utilites

       AUDITCON   2nd   3rd   4th   5th   6th  

       syslog

               linux/Unix   2nd   3rd   4th   5th   6th   7th  

utilities

       Administration Tools

               installing   2nd  

       ADMT  

       Event Viewer   2nd  

       File Migration  

       finger   2nd   3rd   4th   5th  

       iPrint (NetWare)   2nd  

       Linux GUI

               managing users   2nd   3rd   4th   5th   6th   7th   8th   9th  

       MMC (Microsoft Management Console)  

               Action menu   2nd  

               computer management   2nd   3rd   4th   5th   6th  

               properties   2nd   3rd   4th   5th  

               User Manager   2nd   3rd  

       nslookup   2nd  

       NWADMN32   2nd   3rd  

       PCONSOLE Bindery  

       R-utilities  

               authorization   2nd   3rd  

               rcp   2nd   3rd  

               rlogin   2nd   3rd   4th   5th   6th   7th   8th  

               rsh   2nd   3rd   4th  

                ruptime command   2nd  

               rwho command   2nd  

       Secure Shell (SSH)   2nd  

       SYSCON   2nd   3rd   4th   5th   6th  

       syslog  

       Tripwire   2nd   3rd  

       UNIX   2nd   3rd   4th   5th  

               BOOTP   2nd   3rd   4th   5th   6th  

               DHCP   2nd   3rd   4th   5th   6th  

               FTP   2nd   3rd   4th  

               TCP/IP   2nd   3rd  

               telnet   2nd  

               Telnetxxx   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

       User Manager   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       Windows 2003 Server

               Application Compatibility Toolkit   2nd  

Категории