Index P

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

packages  
packet filter firewalls  
packet switching   2nd  
       ATM (Asynchronous Transfer Mode)   2nd   3rd  
       Frame Relay   2nd  
       history and development  
packets  
       capturing   2nd   3rd   4th  
       routing  
       segmenting  
Palo Alto Research Center (PARC)  
PAP (Password Authentication Protocol)  
parameters
       DHCP (Dynamic Host Configuration Protocol) servers   2nd  
PARC (Palo Alto Research Center)  
PARC (Xerox Palo Alto Reserch Center)  
paritioning
       hard drives  
parity bits   2nd  
partitioning
       hard drives   2nd   3rd  
               Disk Management utility  
               FDISK utility  
               guidelines  
partitions
       creating   2nd  
       defined  
       duplicating  
       managing   2nd  
passive matrix displays  
passive topologies  
password attacks  
Password Authentication Protocol (PAP)  
passwords   2nd   3rd   4th  
       Active Directory user accounts   2nd  
       administrator passwords  
       assigning   2nd  
       guidelines   2nd   3rd  
       Linux root passwords   2nd  
       PAP (Password Authentication Protocol)  
       password attacks  
       strong passwords  
paths
       virtual  
PayPal  
PCI bus  
PCMCIA (Personal Computer Memory Card International Association) cards   2nd  
PCs, history of   2nd   3rd  
PDAs (Personal Digital Assistants)   2nd   3rd  
       BlackBerry   2nd   3rd  
       synchronizing with PCs   2nd  
PE_LOVGATE.J virus  
peer communication (OSI model)  
peer computers  
peer-to-peer networks   2nd   3rd   4th   5th  
       advantages   2nd   3rd  
               administration  
               cost  
               servers  
               setup  
               software  
       Artisoft  
       cabling   2nd  
       cost considerations  
       disadvantages   2nd   3rd   4th  
       file sharing   2nd   3rd   4th   5th   6th   7th  
       history of   2nd  
       LANtastic  
       limitations   2nd   3rd  
                backups  
               navigation  
               security   2nd  
               size  
       Linux  
       peer computers  
       printer sharing   2nd   3rd   4th   5th   6th   7th  
       protocols   2nd   3rd   4th  
               TCP/IP   2nd   3rd   4th  
               Windows configuration   2nd   3rd  
       requirements  
       Samba   2nd  
               configuring   2nd   3rd  
               Web site  
       size of   2nd  
       SWAT (Samba Web Administration Tool)   2nd   3rd   4th   5th   6th   7th  
       workgroups   2nd   3rd   4th   5th   6th   7th  
Per Seat licensing  
Per Server licensing  
Performance Monitor   2nd   3rd   4th  
peripherals
       installing  
permanent virtual circuits (PVCs)  
permissions   2nd   3rd   4th   5th  
       defined  
       NTFS
               assigning  
               file permissions   2nd  
               folder permissions   2nd  
               guidelines   2nd  
       share permissions   2nd   3rd  
Personal Computer Memory Card International Association (PCMCIA) cards   2nd  
Personal Digital Assistants   [See PDAs]
phone wire   2nd  
Physical layer (OSI model)   2nd   3rd  
ping command   2nd  
piracy of software  
Plain Old Telephone System (POTS)   2nd  
       CPE (customer premise equipment)  
        demarcation  
       DSL (Digital Subscriber Line)   2nd   3rd  
               ADSL (Asymmetric DSL)  
               costs  
               DSLAMs (Digital Subscriber Line Access Multiplexers)  
       history and development  
       local loops  
planning networks
       network needs   2nd   3rd  
       overview   2nd  
Point-to-Point Protocol (PPP)   2nd  
Point-to-Point Tunneling Protocol (PPTP)  
Pointer (PTR) resource records  
pools
       storage pools
               creating   2nd   3rd   4th  
               defined  
POP3  
POP3 (Post Office Protocol)   2nd  
portable computers   [See mobile computing]
ports
       serial ports  
       well-known port numbers  
Post Office Protocol (POP3)   2nd  
POTS (Plain Old Telephone System)   2nd  
       CPE (customer premise equipment)  
       demarcation  
       DSL (Digital Subscriber Line)   2nd   3rd   4th   5th   6th  
       history and development  
       local loops  
POTS pipes  
power supplies
       uninterruptible (UPS)   2nd   3rd  
PPP (Point-to-Point Protocol)   2nd   3rd  
PPTP (Point-to-Point Tunneling Protocol)  
Practical Cisco Routers  
Presentation layer (OSI model)   2nd   3rd  
PRI (Primary Rate ISDN)  
Primary Rate ISDN  
primary zones  
print brokers   2nd   3rd  
print queues  
print servers   2nd  
print spoolers  
printer pools  
printers
       direct connect printers  
       iPrint clients   2nd   3rd  
       local printers  
       print brokers   2nd   3rd  
       print queues  
       print spoolers  
       printer pools  
       remote printers  
       shared printers   2nd   3rd  
       sharing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
               peer-to-peer networks   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  
Printers dialog box  
printing   2nd   3rd  
       print servers  
processing
       email  
processors   2nd  
programs   [See applications]
       Webmin  
projects
       defined  
Properties dialog box
       Sharing tab   2nd  
protecting against viruses   2nd   3rd  
protocol sniffers   2nd  
protocol stacks
       IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange)  
               addressing   2nd  
               advantages  
               configuring   2nd  
               stack protocols   2nd  
       TCP/IP (Transmission Control Protocol/Internet Protocol)   2nd   3rd  
               DOD model   2nd  
               history of  
               protocols   2nd  
protocols   2nd  
       AARP (AppleTalk Address Resolution Protocol)  
       adding to Windows clients   2nd   3rd  
       AFP (AppleTalk Filing Protocol)  
       AppleShare  
       AppleTalk   2nd  
               addressing   2nd  
               stack protocols   2nd  
       ARP (Address Resolution Protocol)  
       ATP (AppleTalk Transaction Protocol)  
       BOOTP  
       CHAP (Challenge Handshake Authentication Protocol)  
       configuring   2nd   3rd  
       CSMA/CD (Carrier Sense Multiple Access with Collision Detection)  
       DDP (Datagram Delivery Protocol)  
       DHCP (Dynamic Host Configuration Protocol)   2nd   3rd  
               client address requests   2nd   3rd  
               NetWare   2nd  
               running  
               server configuration   2nd   3rd   4th   5th   6th  
       DLC (Data Link Control)   2nd  
       DNS (Domain Name System)   2nd  
               forward lookup zones  
               how it works   2nd  
               namespaces   2nd   3rd  
               NetWare   2nd  
               resource records   2nd  
               reverse lookup zones  
               root domains  
               server configuration   2nd   3rd   4th  
               top-level domains   2nd  
       DOD model
               Application layer  
               Host-to-Host layer  
               Internet layer  
                layers  
               Network Access layer  
       FTP (File Transfer Protocol)   2nd   3rd  
               anonymous FTP   2nd   3rd  
               browser support  
               clients   2nd   3rd   4th  
               servers   2nd   3rd  
       HTTP  
       HTTP (Hypertext Transfer Protocol)   2nd   3rd  
       HTTP (Hypertext Transport Protocol)  
       IMAP  
       IMAP (Internet Message Access Protocol)   2nd  
       installing  
       IP (Internet Protocol)  
               addresses  
               IP address spoofing  
               IP addresses   2nd   3rd   4th   5th   6th   7th   8th  
               IP masquerading  
               security  
       IP (Internet Protocol) addresses   2nd   3rd  
               address ranges   2nd  
               APIPA (Automatic Private IP Addressing)  
               configuring   2nd   3rd   4th   5th  
               IPv6 (IP Version 6)   2nd  
               subnetting   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
       IPSec (Internet Protocol Security)  
       IPX  
       IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange)  
               addressing   2nd  
               advantages  
               configuring   2nd  
               stack protocols   2nd  
       Kerberos   2nd  
       L2TP (Layer 2 Tunneling Protocol)  
       NAT (Network Address Translation)   2nd   3rd   4th  
       NBP (Name Binding Protocol)  
       NCP  
       NetBEUI (NetBIOS Extended User Interface)   2nd  
       NNTP (Network News Transfer Protocol)  
       OSI model  
               advantages of   2nd  
               Application layer   2nd  
               Data Link layer   2nd  
               Network layer   2nd  
               overview   2nd   3rd   4th   5th   6th   7th  
               peer communication  
               Physical layer   2nd  
               Presentation layer   2nd  
               Session layer   2nd  
               Transport layer   2nd   3rd  
       OSPF (Open Shortest Path First)  
       PAP (Password Authentication Protocol)  
       POP3  
       POP3 (Post Office Protocol)   2nd  
       PPP (Point-to-Point Protocol)   2nd  
       PPTP (Point-to-Point Tunneling Protocol)  
       protocol sniffers   2nd  
       protocol stacks  
       RIP  
       RIP (Routing Information Protocol)   2nd  
       routing protocols  
       SAP  
       SHTTP (Secure HTTP)  
       SLIP (Serial Line Internet Protocol)  
       SMB (Server Message Block)  
       SMTP (Simple Mail Transport Protocol)   2nd   3rd  
       SPX  
       TCP  
       TCP (Transfer Control Protocol)  
       TCP/IP
               well-known port numbers  
               Windows configuration   2nd   3rd   4th  
       TCP/IP (Transmission Control Protocol/Internet Protocol)   2nd   3rd   4th  
               DOD model   2nd  
               history of  
               stack protocols   2nd  
       Telnet  
       UDP (User Datagram Protocol)  
       well-known port numbers  
       WINS (Windows Internet Naming Service)   2nd  
       X.25   2nd  
       ZIP (Zone Information Protocol)  
Protocols tab (NT Network dialog box)   2nd  
prots
       well-known port numbers  
proxy servers   2nd   3rd   4th  
       AnalogX Proxy Server   2nd  
       firewalls  
PSTN (Public Switched Telephone Network)   2nd  
       CPE (customer premise equipment)  
       demarcation  
       DSL (Digital Subscriber Line)   2nd   3rd  
               ADSL (Asymmetric DSL)  
               costs  
               DSLAMs (Digital Subscriber Line Access Multiplexers)  
       history and development  
       local loops  
PTR (Pointer) resource records  
public folders  
Public Switched Telephone Network (PSTN)   2nd  
       CPE (customer premise equipment)  
       demarcation  
       DSL (Digital Subscriber Line)   2nd   3rd  
               ADSL (Asymmetric DSL)  
               costs  
               DSLAMs (Digital Subscriber Line Access Multiplexers)  
       history and development  
       local loops  
PVCs (permanent virtual circuits)  



Absolute Beginner's Guide to Networking
Absolute Beginners Guide to Networking (4th Edition)
ISBN: 0789729113
EAN: 2147483647
Year: 2002
Pages: 188
Authors: Joe Habraken

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net