[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] packages packet filter firewalls packet switching 2nd ATM (Asynchronous Transfer Mode) 2nd 3rd Frame Relay 2nd history and development packets capturing 2nd 3rd 4th routing segmenting Palo Alto Research Center (PARC) PAP (Password Authentication Protocol) parameters DHCP (Dynamic Host Configuration Protocol) servers 2nd PARC (Palo Alto Research Center) PARC (Xerox Palo Alto Reserch Center) paritioning hard drives parity bits 2nd partitioning hard drives 2nd 3rd Disk Management utility FDISK utility guidelines partitions creating 2nd defined duplicating managing 2nd passive matrix displays passive topologies password attacks Password Authentication Protocol (PAP) passwords 2nd 3rd 4th Active Directory user accounts 2nd administrator passwords assigning 2nd guidelines 2nd 3rd Linux root passwords 2nd PAP (Password Authentication Protocol) password attacks strong passwords paths virtual PayPal PCI bus PCMCIA (Personal Computer Memory Card International Association) cards 2nd PCs, history of 2nd 3rd PDAs (Personal Digital Assistants) 2nd 3rd BlackBerry 2nd 3rd synchronizing with PCs 2nd PE_LOVGATE.J virus peer communication (OSI model) peer computers peer-to-peer networks 2nd 3rd 4th 5th advantages 2nd 3rd administration cost servers setup software Artisoft cabling 2nd cost considerations disadvantages 2nd 3rd 4th file sharing 2nd 3rd 4th 5th 6th 7th history of 2nd LANtastic limitations 2nd 3rd backups navigation security 2nd size Linux peer computers printer sharing 2nd 3rd 4th 5th 6th 7th protocols 2nd 3rd 4th TCP/IP 2nd 3rd 4th Windows configuration 2nd 3rd requirements Samba 2nd configuring 2nd 3rd Web site size of 2nd SWAT (Samba Web Administration Tool) 2nd 3rd 4th 5th 6th 7th workgroups 2nd 3rd 4th 5th 6th 7th Per Seat licensing Per Server licensing Performance Monitor 2nd 3rd 4th peripherals installing permanent virtual circuits (PVCs) permissions 2nd 3rd 4th 5th defined NTFS assigning file permissions 2nd folder permissions 2nd guidelines 2nd share permissions 2nd 3rd Personal Computer Memory Card International Association (PCMCIA) cards 2nd Personal Digital Assistants [See PDAs] phone wire 2nd Physical layer (OSI model) 2nd 3rd ping command 2nd piracy of software Plain Old Telephone System (POTS) 2nd CPE (customer premise equipment) demarcation DSL (Digital Subscriber Line) 2nd 3rd ADSL (Asymmetric DSL) costs DSLAMs (Digital Subscriber Line Access Multiplexers) history and development local loops planning networks network needs 2nd 3rd overview 2nd Point-to-Point Protocol (PPP) 2nd Point-to-Point Tunneling Protocol (PPTP) Pointer (PTR) resource records pools storage pools creating 2nd 3rd 4th defined POP3 POP3 (Post Office Protocol) 2nd portable computers [See mobile computing] ports serial ports well-known port numbers Post Office Protocol (POP3) 2nd POTS (Plain Old Telephone System) 2nd CPE (customer premise equipment) demarcation DSL (Digital Subscriber Line) 2nd 3rd 4th 5th 6th history and development local loops POTS pipes power supplies uninterruptible (UPS) 2nd 3rd PPP (Point-to-Point Protocol) 2nd 3rd PPTP (Point-to-Point Tunneling Protocol) Practical Cisco Routers Presentation layer (OSI model) 2nd 3rd PRI (Primary Rate ISDN) Primary Rate ISDN primary zones print brokers 2nd 3rd print queues print servers 2nd print spoolers printer pools printers direct connect printers iPrint clients 2nd 3rd local printers print brokers 2nd 3rd print queues print spoolers printer pools remote printers shared printers 2nd 3rd sharing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th peer-to-peer networks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th Printers dialog box printing 2nd 3rd print servers processing processors 2nd programs [See applications] Webmin projects defined Properties dialog box Sharing tab 2nd protecting against viruses 2nd 3rd protocol sniffers 2nd protocol stacks IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange) addressing 2nd advantages configuring 2nd stack protocols 2nd TCP/IP (Transmission Control Protocol/Internet Protocol) 2nd 3rd DOD model 2nd history of protocols 2nd protocols 2nd AARP (AppleTalk Address Resolution Protocol) adding to Windows clients 2nd 3rd AFP (AppleTalk Filing Protocol) AppleShare AppleTalk 2nd addressing 2nd stack protocols 2nd ARP (Address Resolution Protocol) ATP (AppleTalk Transaction Protocol) BOOTP CHAP (Challenge Handshake Authentication Protocol) configuring 2nd 3rd CSMA/CD (Carrier Sense Multiple Access with Collision Detection) DDP (Datagram Delivery Protocol) DHCP (Dynamic Host Configuration Protocol) 2nd 3rd client address requests 2nd 3rd NetWare 2nd running server configuration 2nd 3rd 4th 5th 6th DLC (Data Link Control) 2nd DNS (Domain Name System) 2nd forward lookup zones how it works 2nd namespaces 2nd 3rd NetWare 2nd resource records 2nd reverse lookup zones root domains server configuration 2nd 3rd 4th top-level domains 2nd DOD model Application layer Host-to-Host layer Internet layer layers Network Access layer FTP (File Transfer Protocol) 2nd 3rd anonymous FTP 2nd 3rd browser support clients 2nd 3rd 4th servers 2nd 3rd HTTP HTTP (Hypertext Transfer Protocol) 2nd 3rd HTTP (Hypertext Transport Protocol) IMAP IMAP (Internet Message Access Protocol) 2nd installing IP (Internet Protocol) addresses IP address spoofing IP addresses 2nd 3rd 4th 5th 6th 7th 8th IP masquerading security IP (Internet Protocol) addresses 2nd 3rd address ranges 2nd APIPA (Automatic Private IP Addressing) configuring 2nd 3rd 4th 5th IPv6 (IP Version 6) 2nd subnetting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th IPSec (Internet Protocol Security) IPX IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange) addressing 2nd advantages configuring 2nd stack protocols 2nd Kerberos 2nd L2TP (Layer 2 Tunneling Protocol) NAT (Network Address Translation) 2nd 3rd 4th NBP (Name Binding Protocol) NCP NetBEUI (NetBIOS Extended User Interface) 2nd NNTP (Network News Transfer Protocol) OSI model advantages of 2nd Application layer 2nd Data Link layer 2nd Network layer 2nd overview 2nd 3rd 4th 5th 6th 7th peer communication Physical layer 2nd Presentation layer 2nd Session layer 2nd Transport layer 2nd 3rd OSPF (Open Shortest Path First) PAP (Password Authentication Protocol) POP3 POP3 (Post Office Protocol) 2nd PPP (Point-to-Point Protocol) 2nd PPTP (Point-to-Point Tunneling Protocol) protocol sniffers 2nd protocol stacks RIP RIP (Routing Information Protocol) 2nd routing protocols SAP SHTTP (Secure HTTP) SLIP (Serial Line Internet Protocol) SMB (Server Message Block) SMTP (Simple Mail Transport Protocol) 2nd 3rd SPX TCP TCP (Transfer Control Protocol) TCP/IP well-known port numbers Windows configuration 2nd 3rd 4th TCP/IP (Transmission Control Protocol/Internet Protocol) 2nd 3rd 4th DOD model 2nd history of stack protocols 2nd Telnet UDP (User Datagram Protocol) well-known port numbers WINS (Windows Internet Naming Service) 2nd X.25 2nd ZIP (Zone Information Protocol) Protocols tab (NT Network dialog box) 2nd prots well-known port numbers proxy servers 2nd 3rd 4th AnalogX Proxy Server 2nd firewalls PSTN (Public Switched Telephone Network) 2nd CPE (customer premise equipment) demarcation DSL (Digital Subscriber Line) 2nd 3rd ADSL (Asymmetric DSL) costs DSLAMs (Digital Subscriber Line Access Multiplexers) history and development local loops PTR (Pointer) resource records public folders Public Switched Telephone Network (PSTN) 2nd CPE (customer premise equipment) demarcation DSL (Digital Subscriber Line) 2nd 3rd ADSL (Asymmetric DSL) costs DSLAMs (Digital Subscriber Line Access Multiplexers) history and development local loops PVCs (permanent virtual circuits) |