Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] packet filtering packetization delay packetization of voice traffic packets directed broadcasts network flows unicast forwarding PAM (pulse amplitude modulation) PBXs PCM (pulse code modulation) PDAs PDIOO (Plan-Design-Implement-Operate-Optimize) baselining network statistics design documentation, maintaining planning phase of network deployment peers people-related security vulnerabilities performance management performing site surveys for wireless networks personal area networks PHB classes phishing physical addresses physical layer (OSI model) PIM (Protocol Independent Multicast) PKI (Public Key Infrastructure) planning network deployment point-to-point bridging policies policing political layer (OSI model) port numbers PortFast ports, nondesignated PQ (priority queuing) pre-positioned content prefixes (subnet masks) preliminary design, preparing private addresses 2nd propagation delay protocols routing protocols [See routing protocols] TCP/IP Internet layer TCP transport layer proxies public addresses PVST (per-VLAN Spanning Tree) |