|
NAK (negative acknowledgment), 562
Name Binding Protocol (NBP), 563
names, synchronizing with dynamically assigned IP addresses, 294–295
naming standards, 299–300
NAT (Network Address Translation),290–292, 291, 563
in case study, 513
deciding to use, 291–292
National Security Agency (NSA), 480, 483
native VLAN, 96, 563
NBP (Name Binding Protocol), 563
NCP (NetWare Core Protocol), 137, 563
NCP (Network Control Protocol), 237
negative acknowledgment (NAK), 562
neighbor table, in EIGRP, 334, 335
neighboring routers, 316, 563
in OSPF, 357, 358
in RIP, 326
NET (network entity titles), 380
NetBEUI, 563
NetBIOS, 563
NetFlow switching, 563
for WANs, 228
NetView, 564
NetWare, 564
NetWare Core Protocol (NCP), 137, 563
NetWare Link Services Protocol (NLSP), 137, 313, 376–378, 565
NetWare servers, client tracking, 411
Network Access layer (DOD), 122
protocols, 129–131
Network Address Translation (NAT),290–292, 291, 563
in case study, 513
deciding to use, 291–292
Network Campus module, 564
Network Control Protocol (NCP), 237
Network Edge module, 564
network entity titles (NET), 380
network entry LSA, 361
Network File System (NFS), 20, 565
Network IDS, 486, 564
Network Information Center (NIC), 256
network interface cards (NICs), 565
physical addresses, 130
Network layer (OSI), 27–28, 29, 564
Network Layer Host group in RMON, 440
Network Layer Matrix group in RMON, 440
network management, 564
Network Management module, 198
security risks, 490
Network Management Processor (NMP), 565
network map, 27
network network-number command, 327
network operations center, 564
network switching technology, 69
Network Time Protocol (NTP), 487, 564
networks. See also security
calculating number, 257
corporate requirements, 5
data integrated with voice, 493–495
delay in voice, 494–495
evaluating existing, 157–166
administrative data, 157–158
design methodology, 160–162
inventory, 162–166
technical data, 159
evaluating needs and expectations, 166–169
evolution, 3–4
exam essentials, 170
guidelines, 465
ISO management model, 442–443
life cycle, 155–156
management, 432
benefits of industry standard technologies, 433
exam essentials, 446
proactive, 444–445
naming standards, 299–300
relieving congestion, 69–73
segmentation, 40, 69
topology, 163, 164, 190, 564. See also Enterprise Composite Network Model
exam essentials, 207–208
fault-tolerance, 200–206
full mesh, 203, 204
hierarchical, 190–197
load balancing, 205–206
partial mesh, 204, 204–205
Next Hop Resolution Protocol (NHRP), 565
next-hop router, 331
Next Hop Server (NHS), 565
NFS (Network File System), 20, 565
NHRP (Next Hop Resolution Protocol), 565
NHS (Next Hop Server), 565
NIC (network interface card), 565
NLSP (NetWare Link Services Protocol), 137, 313, 376–378, 565
NMP (Network Management Processor), 565
NoAuthNoPriv message (SNMP), 437
node, 565
non-designated port, for Spanning-Tree Protocol, 85
non-hierarchical addressing, 278
non-root bridge, for Spanning-Tree Protocol, 85
non-stub area, 565
non-volatile RAM (NVRAM), 566
nonreturn to Zero (NRZ), 565
normal response mode (NRM), 232
Novell IPX (Internetwork Packet Exchange), 136–141
client/server communication, 138–139
EIGRP configuration for, 342–343
IPX addressing, 140–141
protocol suite, 136–138
and OSI model, 136
server/server communication, 139–140
watchdog spoofing, 411
NRM (normal response mode), 232
NRZ (nonreturn to Zero), 565
NRZI (nonreturn to zero inverted), 566
NSA (National Security Agency), 480, 483
NTP (Network Time Protocol), 487, 564
NVRAM (non-volatile RAM), 566
|