Index A


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

AAL (ATM Adaption Layer)  
AC (alternating current)  
Academic Source Release (ASR)  
Accelerated Graphics Port (AGP)  
Accent Points
        dual-mode   2nd  
acceptable use statements
       network security   2nd   3rd   4th   5th  
access
       Anonymous Access  
       Arbitrated Loops  
       CSMA/CD   2nd  
       databases
               X.500   2nd   3rd   4th   5th   6th   7th  
       dial-in
               allowing  
       LDAP   2nd   3rd   4th   5th  
       Linux   2nd   3rd   4th   5th   6th   7th   8th   9th  
        methods
               token-passing bus   2nd  
               Token-Ring   2nd  
       NBMA (nonbroadcast mulitple access)  
       NetWare  
       NTFS  
               Windows NT  
       R-utilities   2nd   3rd  
       share-level permissions   2nd  
               Windows 95/98   2nd  
               Windows NT  
       shared network media  
       SMB   2nd   3rd   4th   5th   6th   7th   8th  
       Unix   2nd   3rd   4th   5th   6th   7th   8th   9th  
        user -level permissions   2nd  
               Windows NT/2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
       users
               limiting time   2nd  
       VPN (virtual private network)   2nd   3rd  
       Web-based printers folders
               managing   2nd   3rd   4th   5th  
       Windows NT
               adding users to groups   2nd  
               assigning group memberships   2nd  
               built-in user groups   2nd   3rd  
               creating user groups   2nd   3rd  
               groups   2nd  
               managing user accounts   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
       wireless networking
               selecting locations   2nd   3rd   4th  
       workstations
               limiting   2nd  
Access Code field  
Access Control List (ACL)   2nd   3rd  
       routers  
Access Control Lists (ACLs)  
access control mechanisms (network security)  
       auditing   2nd  
       identifying users   2nd   3rd  
               passwords   2nd   3rd   4th   5th   6th   7th  
       resource protections  
Access Points   2nd   3rd  
access points (APs)   2nd   3rd   4th   5th  
Account Information dialog box   2nd   3rd   4th   5th   6th  
account lockouts
       passwords  
Account Policy dialog box   2nd  
accounts
       Account Information dialog box   2nd   3rd   4th   5th  
       computers
               managing   2nd   3rd   4th  
       generic
               naming  
       interdomain trust relationships   2nd   3rd   4th  
               creating   2nd   3rd   4th   5th  
       time
               limiting   2nd  
       tracking  
       user
               searching   2nd   3rd  
       users
               complete trust models   2nd  
               managing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  
               moving between Linux/NetWare   2nd   3rd  
               Unix   2nd   3rd   4th  
       Windows NT
               creating  
       workstations
               limiting   2nd  
ACK ( Acknowledgement )   2nd  
ACK (acknowledgement)  
acknowledgement (ACK)  
Acknowledgment (ACK)   2nd  
ACL (Access Control List)   2nd   3rd  
       routers  
ACL (Asynchronous Connection-Less)   2nd  
ACLs (Access Control Lists)  
ACPI (Advanced Configuration and Power Interface)   2nd   3rd   4th  
ACPI (Advanced Configuration and Power Management Interface)  
ACR (attenuation to cross talk ratio)  
acronyms   2nd   3rd   4th  
ACT (Access Control Commands)   2nd  
Action menu
       Event Viewer   2nd   3rd   4th   5th  
       MMC   2nd   3rd   4th   5th   6th   7th   8th  
               configuring properties   2nd  
       MMC (Microsoft Management Console)   2nd  
       WINS
               managing   2nd   3rd   4th   5th   6th  
Active Directory  
       ADSI (Active Directory Service Interface)   2nd  
               DC (domain controller)   2nd  
               directory-aware application programming   2nd  
               member servers   2nd  
       application of  
       attributes   2nd  
       DDNS (Dynamic DNS)   2nd  
       directory services   2nd  
       DNS (Domain Name System)  
       domain models   2nd  
       global catalog
               summarizing data   2nd  
       groups   2nd   3rd   4th  
       managing  
       migration
               implementing   2nd   3rd   4th  
               joining trees  
               master domain model   2nd   3rd   4th   5th  
               upgrading BDCs   2nd  
               upgrading PDCs   2nd   3rd   4th   5th  
       objects   2nd   3rd   4th  
               naming   2nd   3rd  
               searching   2nd   3rd   4th   5th   6th   7th   8th   9th  
               standard   2nd   3rd   4th   5th  
       partitioning   2nd  
       replicating   2nd   3rd  
       schema   2nd   3rd   4th   5th   6th   7th  
               modifying   2nd   3rd   4th   5th   6th   7th   8th   9th  
       sites
               managing large enterprises  
       standards   2nd   3rd   4th   5th  
       trees   2nd   3rd   4th  
       Windows 2003 Server   2nd  
               installing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
Active Directory Computers and Users snap-in   2nd   3rd  
Active Directory Migration Tool (ADMT)  
Active Directory Service Interface (ADSI)   2nd  
       DC (domain controller)   2nd  
       directory-aware application programming   2nd  
       member servers   2nd  
Active Directory Service Interface.   [See ADSI]
Active Directory Service Interfaces (ADSI)  
Active Directory Users and Computers command (Start menu)  
Active Dorectory
       objects   2nd  
       services   2nd  
active hubs   2nd   3rd   4th   5th   6th  
       ARCnet  
active mode  
active monitor  
active open connections  
ActiveState ActivePerl 5.6  
ad hoc wireless networks  
ad-hoc networks
       wireless networking   2nd   3rd   4th  
adapter cards  
       10Base-2 networks   2nd   3rd   4th   5th   6th  
       ARCnet   2nd  
adapters
       networks
               troubleshooting  
       PCMCIA   2nd  
       wireless network
               installing   2nd   3rd   4th   5th   6th   7th   8th  
Add Button dialog box  
Add Printer dialog box  
Add Printer Wizard   2nd  
Add Server dialog box  
Add Standalone Snap-in dialog box  
Add Trusted Domains dialog box  
Add Users and Groups dialog box   2nd   3rd  
add-ons
       Korn Shell commands
               SFU (Services for Unix 3.0);NFS   2nd   3rd   4th   5th  
               SFU (Services for Unix);NFS   2nd  
       SFU (Services for Unix 3.0)   2nd   3rd  
               installing   2nd   3rd   4th   5th  
Add/Remove Snap-in dialog box  
adding
       Active Directory schema   2nd  
       computers
               domains   2nd  
       labels   2nd   3rd  
       links
               DFS roots   2nd   3rd  
       objects
               databases  
       printers
               Windows 2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  
               Windows NT 4.0   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  
       server partners  
       servers  
       stacks   2nd  
       users
               groups   2nd  
       wireless networking
               LAN   2nd   3rd   4th   5th   6th   7th  
Address field  
Address Recognized bit  
Address Resolution Protocol (ARP)   2nd   3rd  
       IP addresses
               proxy ARP   2nd  
               resolving   2nd   3rd   4th   5th   6th   7th   8th   9th  
address space
       configuring routers   2nd  
addresses   2nd   3rd   4th   5th  
       APIPA
               DHCP   2nd  
       base I/O ports   2nd   3rd  
       destination   2nd  
       IP
               filtering   2nd  
               spoofing   2nd  
               to cable modems   2nd   3rd   4th  
       MAC
               VLAN (virtual LAN)   2nd  
       MAC (Media Access Control)  
       protocols
               name resolution   2nd  
       reserving  
       reusing  
       routers
               hierarchical network organizations   2nd  
       scope
               configuring   2nd   3rd   4th  
               creating   2nd   3rd   4th   5th  
addressing
       ARCnet   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
       broadcast  
       IP (Internet Protocol)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  
               ARP (Address Resolution Protocol)   2nd   3rd   4th   5th   6th   7th   8th   9th  
               Class A   2nd   3rd   4th  
               Class B   2nd   3rd   4th  
               Class C   2nd  
               Class D   2nd   3rd   4th   5th   6th   7th   8th  
               Class E   2nd   3rd   4th   5th   6th   7th   8th  
               datagram headers   2nd   3rd   4th   5th   6th   7th  
               proxy ARP (Address Resolution Protocol)   2nd  
               RARP (Reverse Address Resolution Protocol)  
               subnetting   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  
               supernetting   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
       MAC (Media Access Control)  
       mulitcast  
       unicast  
adduser -d command
       Unix  
adduser command
       Unix  
administration
       Active Directory  
               large enterprises with sites  
       centralized management   2nd   3rd  
       complete trust models   2nd  
       decentralized management   2nd   3rd  
       directories
               modeling   2nd   3rd  
       domains
               controllers   2nd   3rd  
               creating trust relationships   2nd   3rd   4th   5th  
               interdomain trust relationships   2nd   3rd   4th  
               models   2nd   3rd   4th   5th   6th   7th   8th  
               replication between controllers   2nd   3rd   4th  
               Windows NT   2nd   3rd   4th  
       groups   2nd  
               adding users   2nd  
               assigning group memberships   2nd  
               built-in user groups   2nd   3rd  
               creating user groups   2nd   3rd  
       IEEE 802.1   2nd  
       installation   2nd  
       NDS Manager  
               creating replicas   2nd   3rd  
               partitioning   2nd  
               synchronizing servers   2nd  
       Netware   2nd   3rd  
       NetWare
               NWADMN32   2nd   3rd  
       printers
               Windows 2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  
               Windows NT   2nd   3rd  
       routers
               delegating LAN responsibilties   2nd   3rd  
               LAN sizes   2nd   3rd   4th   5th  
       switches  
       user accounts
               Windows NT   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
       users
               modifying Unix accounts   2nd   3rd   4th  
               Unix   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
       WINS  
               netsh commands   2nd   3rd  
               Windows 2000   2nd   3rd   4th   5th   6th  
               Windows 2003 Server  
       wiring
               drawings  
               records   2nd  
                reports  
               work orders   2nd  
Administration Tools
       installing   2nd  
administrative rights
       delegating   2nd   3rd  
adminstration
       WINS
               Action menu   2nd   3rd   4th   5th   6th  
ADMT (Active Directory Migration Tool)  
ADSI (Active Directory Service Interfaces)  
ADSL   2nd   3rd  
ADSL (Asynchronous Digital Subscriber Line)  
Advanced Audio/Video Remote Control Profile (AVRCP)  
Advanced Configuration and Power Interface (ACPI)   2nd   3rd   4th  
Advanced Configuration and Power Management Interface (ACPI)  
Advanced Encryption Standard (AES)   2nd  
Advanced Power Management (APM)  
aero domain  
AES (Advanced Encryption Standard)   2nd  
agents
       proxy   2nd  
       relay   2nd   3rd  
               DHCP  
AGP (Accelerated Graphics Port)  
AH
       VPN (virtual private network)   2nd   3rd  
AH (Authentication Header)  
alarms   2nd  
alerts
       Unix  
algorithms
       backoff   2nd  
       congestion avoidance  
       Dijkstra  
       OSPF (Open Shortest Path First)   2nd  
               LSDB (Link State Database)   2nd   3rd   4th   5th  
               route calculations  
       SHA (Secure Hash Algorithm)  
       Truncated Binary Exponential Backoff Algorithm  
allocation
       DHCP  
allowing dial-in access  
ALOHA project  
ALOHAnet  
alternate migration plans  
alternation current (AC)  
AMA (Open Mobile Alliance)  
amdinistration
       Web-based printers folders   2nd   3rd   4th   5th  
American National Standards Institute (ANSI)   2nd  
American Power Conversion Corp (APC)  
American Standard Code for Information Interchange (ASCII)  
analog modems  
analysis
       logical network design   2nd   3rd   4th   5th   6th   7th  
                components   2nd   3rd   4th   5th   6th   7th   8th   9th  
               mainatining  
               physical networks  
analyzers   2nd   3rd  
       baselines
               establishing   2nd   3rd  
               statistical data   2nd  
       protocols
               decoding  
               filtering   2nd  
               hardware   2nd   3rd  
               software   2nd   3rd   4th   5th   6th  
               software LAN   2nd   3rd  
analyzers, networks   2nd  
analyzing
       printing statistics   2nd  
Anixter  
Anonymous Access  
ANSI (American National Standards Institute)   2nd  
Antheil, George  
anti-virus applications  
APC (American Power Conversion Corp)  
API (application programming interface)  
APIPA
       DHCP   2nd  
APIPA (Automatic Private IP Addressing)  
APM (Advanced Power Management)  
appliances
       NAS   2nd  
Application Compatibility Toolkit
       Windows 2003 Server   2nd  
application gateways.   [See proxy servers]
Application layer  
application programming interface (API)  
application-specific integrated chips (ASICS)  
application-specific integrated circuits (ASICs)  
applications   2nd   3rd  
       10Base-2 networks
               upgrading   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       Active Directory  
       ADSI (Active Directory Service Interface)   2nd  
               DC (domain controller)   2nd  
               directory-aware application programming   2nd  
               member servers   2nd  
       Anixter  
       assessing   2nd  
       Cisco  
       competing products
               evaluating   2nd  
       copying  
       corporate standards
               verifying   2nd  
       deleting  
       drivers  
               NDIS (Network Driver Interface Specification)   2nd  
               ODI (Open Data-Link Interface)   2nd  
               Packet Drivers   2nd  
       firewalls   2nd   3rd  
       FTP (File Transfer Protocol)   2nd   3rd  
               commands   2nd   3rd   4th   5th  
               data transfers   2nd   3rd   4th  
               ports/processes   2nd  
               Red Hat Linux   2nd   3rd   4th   5th   6th  
               replies   2nd   3rd   4th   5th  
               TFTP (Trivial File Transfer Protocol)   2nd   3rd   4th   5th  
               Windows command-line clients   2nd   3rd   4th   5th   6th   7th   8th   9th  
       gateways  
       HP  
       IBM  
       IP addresses  
       Juniper Networks, Inc.  
       legacy
               maintaining support   2nd  
       LinkSys  
       Linux/NetWare   2nd   3rd   4th  
       Micorosft  
       NETGEAR  
       network sniffers   2nd  
       print servers   2nd   3rd   4th  
       proxy   2nd   3rd   4th  
       RedHat  
       Samba.org  
       security  
       TCP/IP   2nd   3rd  
       Telnet   2nd  
               commands   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
               NVT (Network Virtual Terminal)   2nd  
       Tripwire   2nd   3rd  
       Trojan horses   2nd  
       upgrading   2nd   3rd   4th   5th  
       vertical-market   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       virus-checking  
       viruses   2nd   3rd   4th   5th  
       WEP  
applying
       802.11b networking   2nd   3rd  
               distance limitations  
               firewalls   2nd  
       NAS and SANs   2nd  
       NDS Manager  
               creating replicas   2nd   3rd  
               partitioning   2nd  
               synchronizing servers   2nd  
       routers   2nd   3rd  
       Start/Search method   2nd  
       switches  
       Windows 2000/2003 Event Viewer   2nd   3rd   4th   5th   6th   7th   8th  
       Windows NT 4.0 Event Viewer   2nd   3rd  
       WINS   2nd  
APs (access points)   2nd   3rd   4th   5th  
Arbitrated Loops  
       SANs   2nd   3rd   4th   5th   6th   7th   8th   9th  
architecture
       ATN (Asynchronous Transfer Mode)   2nd   3rd   4th   5th   6th  
       IEEE 802   2nd   3rd   4th   5th  
       IEEE 802.1   2nd  
       IEEE 802.10  
       IEEE 802.11   2nd  
       IEEE 802.2   2nd  
       IEEE 802.3   2nd  
       IEEE 802.4   2nd  
       IEEE 802.5   2nd  
       IEEE 802.7   2nd  
       SCSI  
ARCnet   2nd   3rd  
       bus topologies   2nd  
       configuring   2nd  
        ethernets
               connecting   2nd  
       frame types  
        frames
               formats   2nd   3rd   4th   5th   6th   7th   8th  
       hubs   2nd  
       laying out   2nd   3rd   4th   5th  
       network adapter cards   2nd  
       selecting   2nd  
       star topologies   2nd  
       symbols   2nd   3rd   4th   5th   6th   7th   8th  
       Token-Ring
               laying out   2nd   3rd   4th   5th  
               troubleshooting   2nd   3rd  
               upgrading   2nd   3rd   4th  
       troubleshooting   2nd   3rd   4th   5th   6th  
       upgrading   2nd   3rd   4th  
       wiring   2nd  
ARCnet (Attached Resource Computer Network)   2nd  
       addressing   2nd   3rd  
ARCnet Trade Association (ATA)  
ARP (Address Resolution Protocol)   2nd   3rd  
       IP addresses
               proxy ARP   2nd  
               resolving   2nd   3rd   4th   5th   6th   7th   8th   9th  
arp command   2nd   3rd  
ARPANET   2nd  
arranging domains   2nd  
ASCII
       Telnet NVT  
       transfers  
ASCII (American Standard Code for Information Interchange)  
ASICS (application-specific integrated chips)  
ASICs (application-specific integrated circuits)  
ASR *Academic Source Release)  
assessing
       applications   2nd  
       reliability   2nd  
assessing client work patterns   2nd  
Asset Management component  
assigning
       group memberships   2nd  
assignment
       users  
assignments
       IPX packets   2nd   3rd  
association
       MAC Layer   2nd  
asymmetric encryption  
       digital certificates   2nd   3rd   4th  
       SSL handshakes   2nd  
Asynchronous Connection-Less (ACL)   2nd  
Asynchronous Digital Subscriber Line (ADSL)  
Asynchronous Transfer Mode (ATM)   2nd   3rd   4th  
       architecture   2nd   3rd   4th   5th   6th  
       connections   2nd  
       frames   2nd   3rd  
       Lan emulation   2nd  
       service categories   2nd   3rd   4th  
ATA (ARCnet Trade Association)  
ATM
       Frame Relay   2nd  
       IP over  
ATM (Asynchronous Transfer Mode)   2nd   3rd   4th  
       architecture   2nd   3rd   4th   5th   6th  
       connections   2nd  
       frames   2nd   3rd  
       LAN emulation   2nd  
       service categories   2nd   3rd   4th  
ATM Adaption Layer (AAL)  
ATRN command  
Attached Resource Computer Network.   [See ARCnet]
attacks
       denial of service  
       digital certificates   2nd   3rd  
       distributed denial-of-service  
       forged e-mail   2nd  
       types of  
               denial-of-service   2nd  
               distributed denial-of-service   2nd   3rd   4th  
               ICMP redirects   2nd   3rd  
               Ping of Death   2nd  
       WANs (wide area networks)
               back doors   2nd  
               forged e-mail   2nd  
               passwords   2nd  
               preventing   2nd   3rd  
               Trojan horses   2nd  
               types of attacks   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
               viruses   2nd   3rd   4th   5th  
attenuation   2nd   3rd  
       fiber- optic cables  
       testing  
attenuation to cross talk ratio (ACR)  
attributes
       Active Directory   2nd  
       property set  
       selected  
       User Account object  
Audio/Video Remote Control Profile  
Audit Policy dialog box  
auditing   2nd  
       enabling   2nd   3rd   4th   5th   6th   7th   8th   9th  
       Linix   2nd   3rd   4th  
               syslog   2nd   3rd   4th   5th   6th   7th  
               system log files   2nd   3rd  
       NetWare 6   2nd  
       networks   2nd  
       reports   2nd  
       Unix   2nd   3rd   4th  
               syslog   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       Windows 2000/2003
               configuring   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  
       Windows NT 4.0
               configuring   2nd   3rd   4th   5th   6th   7th  
       Windows XP Professional   2nd   3rd   4th  
Auditing Entry dialog box  
AUTH command  
authenitcation
       users
               Linux/NetWare  
authenticated commands   2nd  
authentication  
       basic authentication  
       digest  
       domain controllers   2nd   3rd  
               replication   2nd   3rd   4th  
       encrypted  
       integrated Windows  
       LDAP   2nd  
       pass-through  
       Telent   2nd   3rd  
Authentication Header (AH)  
authority
       delegating for network security  
               specialized servers   2nd  
               user accounts   2nd  
authorization
       R-utilities   2nd   3rd  
       share-level permissions   2nd  
               Windows 95/98   2nd  
               Windows NT  
       user-level permissions   2nd  
               Windows NT/2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
AUTHORIZATION state   2nd  
authorizing
       DHCP
               servers   2nd   3rd  
Automatic Private IP Addressing (APIPA)  
automation
       file systems   2nd  
automount command   2nd   3rd  
autonmous systems
       RIP (Routing Information Protocol)   2nd   3rd   4th   5th   6th  
               router updates   2nd   3rd   4th  
               scalability   2nd  
               version 2   2nd   3rd  
autonomous systems  
autosensing   2nd  
AVCP (Audio/Video Remote Control Profile)  
AVRCP (Advanced Audio/Video Remote Control Profile)  



Upgrading and Repairing Networks
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2003
Pages: 434

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net