Index P


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

p-node clients  
PAC (data packet frames )  
PAC (Packet)  
pac command   2nd  
Packet (PAC)  
Packet Drivers   2nd  
Packet Exchange Protocol (PXP)  
packet filtering  
packet filters   2nd  
       intrusion detection (dynamic packet filters)   2nd  
Packet Header field  
packets
       Bluetooth   2nd   3rd   4th  
       BOOTP   2nd   3rd   4th   5th  
       Configure-Request  
       DHCP   2nd   3rd   4th   5th  
       DHCPINFORM  
        ethernets
               802.2 LLC standard   2nd   3rd   4th   5th  
               802.3 standard  
               Ethernet II/PARC   2nd   3rd  
               frames   2nd  
       filtering   2nd   3rd  
               routers   2nd  
       IPX (Internetwork Packet Exchange)   2nd  
               type assignments   2nd   3rd  
       magic   2nd   3rd  
       NCP (NetWare Core Protocol)
               signature options   2nd  
       PAC  
       signature
               NCP (NetWare Core Protocol)   2nd  
               troubleshooting   2nd  
       signature levels   2nd  
       SPX (Sequenced Packet Exchange)   2nd  
       WOL-compliant network cards   2nd  
padding
       IP (Internet Protocol)  
page messages  
Palm PDAs  
Palo Alto Research Center (PARC)  
PAM (Password Authentication Manager)  
PAN (personal area network)   2nd   3rd   4th  
panels
       patches   2nd   3rd   4th  
paper documentation   2nd  
PAR (Project Authorization Request)  
parameters
       -debug  
       -nobsd  
       -nofork  
       passwords
               Windwos NT   2nd   3rd  
       Unix  
PARC   2nd   3rd  
PARC (Palo Alto Research Center)  
paritioning
       Active Directory   2nd  
parity checks  
park mode  
partial mesh topologies  
partial synchronization   2nd  
partitioning
       NDS Manager   2nd  
partitions
       NetWare  
partners
       servers
               adding  
pass-through authentication  
passband technologies  
passive hubs   2nd   3rd   4th   5th  
       ARCnet   2nd  
passive open connections  
password Authentication Manager (PAM)  
passwords   2nd   3rd   4th  
       clear-text  
       construction guidelines   2nd  
       grabbers   2nd  
       interdomain trust relationships   2nd   3rd   4th  
               creating   2nd   3rd   4th   5th  
       policies   2nd   3rd  
               account lockouts  
               expirations  
               history lists  
               managing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       smart cards   2nd  
       synchronizing   2nd   3rd   4th  
       tracking  
       Unix
               shadow password files   2nd  
       Windows NT   2nd   3rd  
               detecting failed logon attempts   2nd   3rd  
patches
       panels   2nd   3rd   4th  
               fiber optic  
Pathworks  
patterns
        hopping  
Payload Type (PT)  
PC cards  
PCF (Point Coordination Function)  
PCI
       bus   2nd   3rd  
PCI (Peripheral Component Interconnect)  
PCL (Printer Control Language)  
PCL.SEP  
PCMCIA
       bus   2nd  
PCONSOLE Bindery utility  
PCS (Physical Coding Sublayer)  
PDA (personal digital assistant)  
PDAs (Personal Digital Assistants)   2nd  
PDC (Primary Domain Controller)  
PDCs
       upgrading   2nd   3rd   4th   5th  
PDCs (primary domain controllers)  
PDU (protocol Data Unit)  
peer-to-peer networking models
       domains  
performance
       cables   2nd  
       NAS  
Peripheral Component Interconnect (PCI)  
permanent virtual connection (PVC)  
permissions
       cumulative effects of  
       Linux   2nd   3rd   4th   5th   6th   7th   8th   9th  
       NetWare   2nd  
               comparing NDS/file system rights  
               configuring   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  
               Everyone group   2nd  
               file system rights   2nd  
               inheritance of rights   2nd   3rd   4th  
               object/property rights   2nd   3rd   4th  
               trustees  
       NTFS  
               Windows NT  
       SGID (Set Group ID)   2nd   3rd   4th   5th  
       share-level   2nd  
               Windows 95/98   2nd  
               Windows NT  
       SUID (Set User ID)   2nd   3rd   4th   5th  
       Unix   2nd   3rd   4th   5th   6th   7th   8th   9th  
       user-level   2nd  
               Windows NT/2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
personal area network (PAN)   2nd   3rd   4th  
personal digital assistant (PDA)  
Personal Digital Assistants (PDAs)   2nd  
Personal Information Managers (PIMs)  
personnel, network upgrades   2nd  
PGP (Pretty Good Privacy)   2nd   3rd   4th  
phasing Ethernets into Token-Ring networks   2nd   3rd   4th   5th   6th   7th  
PHY (Physical layer)  
Phyoical Layer  
Physical Coding Sublayer (PCS)  
physical connections
       routers   2nd   3rd   4th  
physical inteface cards (PICs)  
Physical layer  
Physical Layer
       ATM  
       IEEE 802   2nd  
Physical layer
       IEEE 802.11 standards   2nd   3rd  
Physical layer (PHY)  
Physical layers  
physical measures (network security)  
       disposing of hardware and media   2nd  
       locking the door   2nd  
       UPS (Uninterruptable Power Supply)   2nd  
Physical Media Dependent (PMD)  
Physical Medium Dependent (PMD)  
physical networks
       planning  
physical topologies   2nd  
physical topology  
Piano  
piconets   2nd   3rd  
       Bluetooth   2nd   3rd   4th   5th  
PICs (physical interface cards)  
PID (process ID)  
pilot programs
       executing   2nd  
PIMs (Personal Information Managers)  
ping command   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
Ping of Death   2nd  
Ping utility  
piracy  
pitfalls of troubleshooting   2nd   3rd  
Plain Old Telephone Service (POTS)  
planning
        components   2nd   3rd   4th   5th   6th   7th  
               tetsing   2nd  
       disaster recovery  
       logical network design   2nd   3rd   4th   5th   6th   7th  
       maintenance  
       migration
               arranging domains   2nd  
               centralized/decentralized management   2nd   3rd  
               domain controllers   2nd   3rd  
               implemeting to Active Directories   2nd   3rd   4th  
               joining trees  
               maste domain model   2nd   3rd   4th   5th  
               member servers   2nd   3rd  
               modeling directories   2nd   3rd  
               namespaces   2nd  
               upgrading BDCs   2nd  
               upgrading PDCs   2nd   3rd   4th   5th  
       network upgrades   2nd   3rd   4th   5th   6th   7th  
               maintaining support   2nd  
                surveying users   2nd   3rd  
       networks
               avoiding sidetracks   2nd  
               closing  
               deploying   2nd   3rd  
               documenting upgrades   2nd  
               executing pilot programs   2nd  
               measuring success   2nd  
               restoring   2nd  
               scheduling downtime  
               setting goals  
               testing   2nd   3rd   4th  
               training   2nd  
               upgrades   2nd  
               upgrading   2nd   3rd  
               verifying corporate standards   2nd  
       physical networks  
       upgrading   2nd   3rd   4th   5th  
PLOGI (Port Login)   2nd  
plugs   2nd  
PMD (Physical Media Dependent)  
PMD (Physical Medium Dependent)  
Pocket PCs  
Point Coordination Function (PCF)  
point-to-point connections
       leased lines   2nd   3rd  
               Fractional T1  
               T-carrier system   2nd   3rd   4th  
               troubleshooting T-carrier system   2nd   3rd   4th   5th  
Point-to-Point Protocol (PPP)   2nd   3rd   4th   5th   6th   7th  
       LCP (Link Control Protocol)
               establishing   2nd   3rd   4th   5th   6th  
       NCP (Network Control Protocol)
               establishing   2nd  
       Windwos 2000 Professional Client
               configuring   2nd   3rd   4th   5th  
policies   2nd   3rd   4th  
       auditing
               configuring Windows 2000/2003   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  
               configuring Windows NT 4.0   2nd   3rd   4th   5th   6th   7th  
       passwords  
               managing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       security   2nd  
               acceptable use statements   2nd   3rd   4th   5th  
               elements to include   2nd   3rd   4th  
               escalation procedures   2nd   3rd  
               guidelines for usage   2nd  
               Network Connection Policy   2nd  
               passwords   2nd  
poll packet  
pools
       printers  
POP3 (Post Office Protocol)   2nd  
       AUTHORIZATION state   2nd  
       TRANSACTION state   2nd  
       UPDATE state  
Port Login (PLOGI)   2nd  
ports
       back doors  
       base I/O   2nd   3rd  
       filtering   2nd   3rd   4th  
       FTP (File Transfer Protocol)   2nd  
       identifiers  
       IP addresses  
        numbers  
       routers   2nd   3rd   4th  
       switches  
       UDP   2nd   3rd   4th  
       uplink  
       VLAN (virtual LAN)   2nd  
       Windows NT
               selecting   2nd  
portsw
       TCP   2nd   3rd   4th  
Positive Completion replies  
Positive Intermediate replies  
Post Office Protocol (POP3)   2nd  
       AUTHORIZATION state   2nd  
       TRANSACTION state   2nd  
       UPDATE state  
post-implementation reviews
       networks upgrades  
PostScript  
POTS (Plain Old Telephone Service)  
power
       SOHO (Small Office and Home Office)
               troubleshooting   2nd   3rd  
power conditioning   2nd   3rd   4th   5th  
       ACPI (Advanced Configuration and Power Interface)   2nd   3rd   4th  
       network devices  
Power Management component  
Power SUM  
PPP
       frames  
       RFCs  
PPP (Point-to-Point Protocol)   2nd   3rd   4th   5th   6th   7th  
       LCP (Link Control Protocol)
               establishing   2nd   3rd   4th   5th   6th  
       NCP (Network Control Protocol)
               establishing   2nd  
       Windows 2000 Professional Client
               configuring   2nd   3rd   4th   5th  
PPTP (Point-to-Point Protocol)
       VPN (virtual private network)   2nd   3rd  
pr command  
PRBS (pseudorandom binary sequence)  
Preboot Execution Environment (PXE)  
predefined groups  
Presentation layer  
Pretty Good Privacy (PGP)   2nd   3rd   4th  
preventative maintenance
       NIC (network interface card)  
preventing
       down time   2nd  
       network congestion   2nd   3rd  
prevention
       attacks
               WANs (wide area networks)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th  
       of attacks
               digital certificates   2nd   3rd  
preventive maintenance
        backups   2nd   3rd   4th   5th   6th   7th  
               media   2nd   3rd   4th   5th  
               off-site storage   2nd   3rd  
               rotation schedules   2nd  
       disaster recovery  
       documenting   2nd  
       network monitoring   2nd  
       redundancy  
       routine   2nd  
       UPS (uninterruptible power supply)   2nd   3rd   4th   5th  
               ACPI (Advanced Configuration and Power Interface)   2nd   3rd   4th  
               network devices  
preventive security measures   2nd   3rd  
       host computers   2nd  
       routers   2nd  
       training   2nd  
       Tripwire   2nd   3rd  
       updating   2nd  
       virus-checking applications  
Primary Domain Controller (PDC)  
primary domain controllers (PDCs)  
Primary Domain Controllers.   [See PDCs]
primary servers   2nd   3rd   4th   5th   6th   7th   8th   9th  
primitives   2nd  
       SNMP (Simple Network Management Protocol)   2nd  
print Operators group  
Print Server
       properties   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
Printer Control Language (PCL)  
Printer Properties   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       Windows 2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
Printer Server Properties
       Windows 2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
printers
       auditing
               enabling   2nd  
       events   2nd  
       naming  
       searching   2nd  
       sharing   2nd  
               Linux/NetWare   2nd  
       Web browsers
               managing printers   2nd   3rd  
       Windows NT
               managing   2nd  
printing
       FORTRAN  
       hardware-based print servers   2nd   3rd   4th  
       IPP   2nd   3rd  
       languages   2nd  
       NetWare   2nd   3rd   4th  
               NPRINTER.NLM   2nd  
               Print Queue object properties   2nd  
               Print Server object properties   2nd  
               Printer object properties   2nd   3rd  
               PSERVER.NLM   2nd  
       print server applications   2nd   3rd   4th  
       protocols   2nd  
               BSD (Berkeley System Distribution)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th  
               IPP   2nd   3rd   4th   5th   6th   7th  
               TCP/IP   2nd  
       statistics   2nd  
       Unix
               SVR4   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
       Windows 2000
               adding printers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  
       Windows print servers
               adding printers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  
               printers/printing devices   2nd   3rd   4th  
       Windows XP Professional   2nd   3rd   4th   5th   6th   7th   8th   9th  
PrintQueue object  
privacy   2nd   3rd  
private keys
       SSL handshakes   2nd  
privileges.   [See also rights]
privlieges
       administrative rights  
problem resolution cycle   2nd   3rd   4th   5th   6th   7th   8th  
procedures   2nd   3rd   4th  
       NFS   2nd   3rd   4th  
       security   2nd  
       troubleshooting  
process ID (PID)  
process of elimination , troubleshooting   2nd   3rd  
processes
       FTP (File Transfer Protocol)   2nd  
profiles  
       Bluetooth   2nd   3rd   4th  
               Cordless Telephony   2nd  
               Dial-Up Networking  
               Generic Access   2nd   3rd  
               Headset   2nd  
               Intercom   2nd  
               Serial Port  
               Service Discovery Application   2nd  
       users   2nd  
programming
       directory-aware application   2nd  
Project Authorization Request (PAR)  
projects
       plans  
promiscuous mode   2nd  
properties  
       Bindery  
       Document   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       FTP  
       MMC
               configuring   2nd  
       MMC (Microsoft Management Console)   2nd   3rd   4th   5th  
       NetWare
               rights   2nd   3rd   4th   5th   6th  
       Print Queue object properties   2nd  
       Print Server   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       Print Server object properties   2nd  
       Printer   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       Printer object properties   2nd   3rd  
property data sets
       Bindery  
property set attribute  
propogation
       nominal velocity of  
proprietary protocols
       NetWare   2nd   3rd   4th   5th  
proprietary protocols.   [See also protocols]
protection
       passwords   2nd  
protection.   [See also security]
protocols   2nd  
       analyzers   2nd   3rd  
               decoding protocols  
               establsihing baselines   2nd   3rd  
               filtering protocols   2nd  
               hardware   2nd   3rd  
               software   2nd   3rd   4th   5th   6th  
               software LAN   2nd   3rd  
               statistical data   2nd  
       ARP (Address Resolution Protocol)   2nd  
       Bluetooth  
       BOOTP   2nd  
               client/server exchanges (DHCP)   2nd   3rd   4th   5th   6th   7th   8th   9th  
               DHCP   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
               downloading operating systems   2nd  
               options fields   2nd   3rd   4th   5th  
               packet formats   2nd   3rd   4th   5th  
               relay agents   2nd   3rd  
               request/reply mechanisms   2nd   3rd   4th  
               support  
       BOOTP (Bootstrap protocol)  
       BSD (Berkeley System Distribution)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th  
       configuring routers   2nd  
       DAP (Directory Access Protocol)  
       DECnet  
       DHCP
               allocation  
               APIPA   2nd  
               authorizing servers   2nd   3rd  
               BOOTP   2nd   3rd   4th   5th   6th   7th  
               BOOTP support  
               client/server exchanges   2nd   3rd   4th   5th   6th   7th   8th   9th  
               clustering   2nd  
               configuring   2nd   3rd   4th  
               customizing   2nd   3rd   4th   5th  
               daemons   2nd   3rd  
               DNS   2nd   3rd   4th   5th   6th  
               exclusions/ reservations   2nd  
               installing servers   2nd   3rd  
               large/routed environments  
               leasing servers  
               managing logging   2nd   3rd  
               MMC Action menu   2nd   3rd   4th   5th   6th   7th   8th  
               Red Hat Linux   2nd  
               relay agents   2nd   3rd   4th  
               troubleshooting  
       DHCP (Dynamic Host Configuration Protocol)   2nd   3rd  
       DISP (Directory Information Shadowing Protocol)  
       DOP (Directory Operational Binding Management Protocol)  
       DSP (Directory System Protocol)  
       EGP (Exterior Gateway Protocols)   2nd  
       file servers   2nd   3rd  
       filtering   2nd   3rd  
       FTP  
               firewalls   2nd  
       FTP (File Transfer Protocol)   2nd   3rd  
               commands   2nd   3rd   4th   5th  
               data transfers   2nd   3rd   4th  
               ports/processes   2nd  
               Red Hat Linux   2nd   3rd   4th   5th   6th  
               replies   2nd   3rd   4th   5th  
               TFTP (Trivial File Transfer Protocol)   2nd   3rd   4th   5th  
               Windows command-line clients   2nd   3rd   4th   5th   6th   7th   8th   9th  
       FTP.   [See also FTP]
       HELLO  
       HTTP   2nd   3rd  
               header fields  
       ICMP (Internet Control Message Protocol)   2nd   3rd  
               message types   2nd   3rd   4th   5th  
       IDP (Internet Datagram Protocol)  
       IGMP (Internet Group Management Protocol)  
       IGP (Interior Gateway Protocols)   2nd  
       IMAP4   2nd   3rd  
               client commands   2nd  
               commands   2nd   3rd   4th  
               data formatting   2nd  
               mailbox naming   2nd  
               states  
               system flags   2nd  
               universal commands  
       IP  
               Fibre Channel  
               SANs   2nd   3rd  
       IP (Internet Protocol)  
               addressing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  
               ARP (Address Resolution Protocol)   2nd   3rd   4th   5th   6th   7th   8th   9th  
               connections   2nd  
               datagram headers   2nd   3rd   4th   5th   6th   7th  
               implementing   2nd  
               proxy ARP (Address Resolution Protocol)   2nd  
               RARP (Reverse Address Resolution Protocol)  
               subnetting   2nd   3rd   4th   5th   6th   7th   8th  
               supernetting   2nd   3rd   4th   5th   6th  
                unacknowledged protocol  
               unreliable protocol  
       IPCP (Internet Protocol Control Protocol)  
       IPP   2nd   3rd  
       IPP (Internet Printing Protocol)
               installing  
               object types  
               operations   2nd   3rd  
               Version 1.1   2nd  
               Windows 2000  
       IPv6  
               comparing to IPv4   2nd   3rd  
               extension headers   2nd   3rd  
               headers   2nd   3rd   4th  
               Options Type field  
       IPX (Internetwork Packet Exchange)   2nd  
               frames   2nd  
               packets   2nd   3rd   4th   5th  
       IPXCP (Internetwork Packet Exchange Control Protocol)  
       ISAKMP (Internet Security Association and Key Management Protocol)  
       L2CAP (Logical Link Control Adaption Protocol)  
       LAN   2nd  
       LCP (Link Control Protocol)   2nd   3rd   4th   5th   6th   7th  
       LDAP   2nd   3rd   4th   5th  
               binding requests   2nd  
               comparing databases   2nd  
               directories  
               interoperability between directories   2nd  
                metadirectories  
               modifying databases  
               searching databases   2nd  
               selecting directories   2nd  
               X.500   2nd   3rd   4th   5th   6th   7th   8th   9th  
       LDAP (Lightweight Directory Access Protocol)   2nd  
       limitations  
       Linux/NetWare  
       LMP (Link Manager Protocol)  
       lpr/lpd  
       Mount   2nd   3rd   4th   5th   6th  
       multi-protocol label switching   2nd   3rd  
        name resolution
               hardware comparisons   2nd  
       NAS   2nd  
       NCP (NetWare Core Protocol)   2nd   3rd   4th   5th  
               burst mode  
               packet signatures   2nd  
               requests/responses   2nd   3rd   4th  
               signature options   2nd   3rd   4th   5th   6th  
               terminating  
               troubleshooting packet signatures   2nd  
       NCP (Network Control Protocol)   2nd   3rd  
       NetWare   2nd   3rd   4th   5th  
       NetWare version 6
               LANs   2nd  
       NFS  
       NFS (Network File System)   2nd  
               configuring  
               daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
               procedures   2nd   3rd   4th  
               RPC   2nd   3rd  
               server-side daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
               troubleshooting   2nd   3rd   4th  
               XDR   2nd  
       OBEX (object exchange protocol)  
       OSI (Open Systems Interconnection)  
       POP3 (Post Office Protocol)   2nd  
               AUTHORIZATION state   2nd  
               TRANSACTION state   2nd  
               UPDATE state  
       PPP
               RFCs  
       PPP (Point-to-Point Protocol)   2nd   3rd   4th   5th   6th   7th  
               configuring Windows 2000 Professional Client   2nd   3rd   4th   5th  
               establishing LCP   2nd   3rd   4th   5th   6th  
               establishing NCP   2nd  
       RARP  
       RARP (Reverse Address Resolution Protocol)  
       RIP (Routing Information Protocol)   2nd   3rd   4th   5th   6th  
               router updates   2nd   3rd   4th  
               scalability   2nd  
               version 2   2nd   3rd  
       RMON   2nd  
       RMON (Remote Monitoring Protocol)  
       routers   2nd   3rd  
       routing
               types of   2nd  
       SAP (Service Advertising Protocol)  
       SDP (Service Discovery Protocol)  
       selecting   2nd  
       SLIP (Serial Line Internet Protocol)   2nd   3rd   4th   5th   6th   7th  
       SMB   2nd   3rd   4th   5th  
       SMB (Server Message Block)
               CIFS   2nd   3rd  
               files   2nd   3rd   4th   5th   6th   7th   8th  
               negotiation   2nd  
               NET commands   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
               Samba   2nd   3rd  
       SMB.   [See also SMB]
       SMTP (Simple Mail Transfer Protocol)   2nd   3rd   4th   5th   6th  
               commands   2nd   3rd   4th   5th  
               extensions  
               models   2nd   3rd   4th  
               response codes   2nd   3rd   4th   5th  
               transactions   2nd  
       SNMP   2nd  
       SNMP (Simple Network Management Protocol)   2nd   3rd  
               MIB (Management Information Base)   2nd   3rd   4th   5th  
               primitives   2nd  
               proxy agents   2nd  
               RMON (Remote Monitoring)   2nd   3rd   4th   5th  
               SNMPv2/SNMPv3   2nd   3rd  
       SNMP (Simple Network Monitoring Protocol)  
       Spanning Tree  
       SPX (Sequenced Packet Exchange)   2nd  
               communications   2nd  
               packets   2nd  
               SPXII   2nd  
       stacks   2nd  
               adding   2nd  
       stateful  
       stateless  
       TCP  
               LANs   2nd  
       TCP (Transmission Control Protocol)  
               configuring sessions   2nd   3rd  
               connections  
               ending sessions   2nd  
               headers   2nd   3rd   4th  
               managing sessions   2nd   3rd   4th   5th   6th   7th   8th   9th  
               security   2nd  
               sessions   2nd  
       TCP/IP
               name resolution   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th  
               OSI Reference model   2nd   3rd   4th   5th   6th  
               Unix   2nd  
       TCS (Telephony Control Protocol)  
       Telnet   2nd  
               authentication   2nd   3rd  
               commands   2nd   3rd   4th   5th   6th   7th   8th  
               NVT (Network Virtual Terminal)   2nd  
       TFTP (Trivial File Transfer Protocol)   2nd   3rd   4th   5th  
       TKIP  
       UDP  
       UDP (User Datagram Protocol)   2nd   3rd  
               headers  
               ICMP interaction  
       UNIX   2nd   3rd   4th   5th  
               BOOTP   2nd   3rd   4th   5th   6th  
               DHCP   2nd   3rd   4th   5th   6th  
               FTP   2nd   3rd   4th  
               TCP/IP   2nd   3rd  
               telnet   2nd  
               Telnetxxx   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
       VLAN (virtual LAN)   2nd  
       VPN (virtual private network)   2nd  
               AH   2nd   3rd  
               ESP   2nd   3rd   4th  
               IKE   2nd  
               IPSec   2nd  
               L2TP   2nd   3rd   4th   5th   6th  
               PPTP   2nd   3rd  
       WAN   2nd  
       wireless
               selecting   2nd  
       WTRP  
       XPP (Xerox Packet Protocols)  
protocols Data Unit (PDU)  
providing
       services
               Linux/NetWare   2nd   3rd  
proxy agents   2nd  
proxy applications   2nd   3rd   4th  
proxy ARP (Address Resolution Protocol)   2nd  
proxy servers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  
Proxy Settings dialog box   2nd  
PSCRIPT.SEP  
PSERVER.NLM   2nd   3rd  
pseudorandom binary sequence (PRBS)  
PSTN   2nd   3rd  
PSTN (public switched telephone network)  
PSTN (Public Switched Telephone Network)  
PSTN (public switched telephone network)   2nd   3rd  
PT (Payload Type)  
Public group.   [See also Everyone group]
public key encryption   2nd   3rd   4th   5th   6th   7th   8th  
       RSA public key encryption   2nd  
public keys
       SSL handshakes   2nd  
public switched telephone network (PSTN)  
Public Switched Telephone Network (PSTN)  
public switched telephone network (PSTN)   2nd   3rd  
public use of 802.11b networking   2nd  
publications
       IEEE standards  
pulling
       records  
pulse width, configuring  
purchasing
       switches
               VLAN (virtual LAN)   2nd   3rd  
pushing
       records  
PVC (permanent virtual connection)  
PXE (Preboot Execution Environment)  
PXP (Packet Exchange Protocol)  



Upgrading and Repairing Networks
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2003
Pages: 434

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net