N



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

NAAS (Novell Advanced Audit Service)
name resolution
     hardware/protocol address comparisons
     NetBIOS
         LMHOSTS file
         WINS
     NIS
     TCP/IP
     troubleshooting
     Windows 2000 Server
names
     BIND
     domains 2nd
     generic accounts
     mailboxes
     NBNS
     objects
     printers
     queries
     RDN
     registration
    users
         mapping
         tracking
    WINS [See WINS (Windows Internet Naming Service).]
namespaces 2nd [See also forests (Active Directory).]
     contiguous
     X.500
narrowbands 2nd
NAS (Network Attached Storage) 2nd
NAT (Network Address Translation) 2nd 3rd 4th
National Electrical Code (NEC)
National Institute of Standards and Technology (NIST)
navigation
NBMA (nonbroadcast multiple access)
NBNS (NetBIOS Name Server)
NBTSTAT command
NCP (NetWare Core Protocol)
NCP (Network Control Protocol) 2nd
NDIS (Network Driver Interface Specification)
NDS (Novell Directory Service) 2nd 3rd 4th [See also NetWare, decline.]
near-end cross-talk (NEXT) 2nd 3rd
NEC (National Electrical Code)
negotiations
     protocols
     Telnet options
Nelson, Ted
NET commands
     NET SHARE
     NET STATISTICS
     NET USE
     NET VIEW
NetBIOS name resolution
     LMHOSTS file
     WINS
NetBIOS Name Server (NBNS)
NETGEAR
netsh commands
netstat command
netstate command
NetWare
     decline
     directories
     drivers, locating
     iPrint utility
     Linux/Unix integration
     permissions
         Everyone group
         file system rights
         inheritance of rights
         NDS/file system rights, comparing
         object/property rights
         trustees
         Windows 2000/2003
     printing
         NPRINTER.NLM
         properties
         PSERVER.NLM
     protocols
     security 2nd
     TCP/IP
     Unix/Linux integration 2nd
     user accounts, moving
     Windows 2000 migration
         CSNW
         GSNW
         SFN 2nd
NetWare 6
     auditing
    versions
         6
         6.x
NetWare Core Protocol (NCP)
Network Address Server Settings/DHCP (Internet Connection Type dialog)
Network Address Translation (NAT) 2nd 3rd 4th
Network Connection Policy
Network Control Protocol (NCP) 2nd
Network Driver Interface Specification (NDIS)
Network File System (NFS) 2nd 3rd
     configuring
     daemons
     procedures
     RPC
     server-side daemons
     troubleshooting
     XDR
Network Information Service [See NIS (Network Information Service).]
network interface card [See NICs (network interface cards).]
network management station (NMS)
network operating system (NOS)
Network Printer Server
Network Virtual Terminal (NVT)
Network-Node Interface (NNI)
Networking Services dialog box 2nd
networks
     100BASE-FX 2nd
     100BASE-T
     100BASE-T4 2nd
     100BASE-TX
     10BASE-2 2nd
     10BASE-36
     10BASE-5
     10BASE-FL
     10BASE-T
         10BASE-2 networks, upgrading from
         upgrading from
    802.11-based [See 802.11-based networks.]
    access, controlling
         auditing
         identifying users
         resource protections
    adapters
         cards
         installing
         troubleshooting
     analyzers 2nd
         decoding protocols
         establishing baselines
         filtering protocols
         hardware
         software
         software LAN
         statistical data
     APs
     auditing
     back doors
     backbones, upgrading
    Bluetooth [See Bluetooth, overview.]
     BOOTP
         client/server exchanges (DHCP)
         DHCP
         downloading operating systems
         options fields
         packet formats
         request/reply mechanisms
     broadband local area
     broadcast storms
     cable connectors
     Cisco
     configuring
     congestion
    connections
         different cables/topologies
         repairing
     devices
     dial-up connections
         configuring Windows Professional Client
         optimizing
         PPP
         SLIP
     directories
     encryption
    ethernets
         10 Gigabit Ethernet
         adapters
         backbones
         backoff algorithm
         collisions
         Fast Ethernet
         frames
         full-duplex switches
         Gigabit 2nd
         history 2nd
         overview
         security
         switches
         topologies
         troubleshooting
         types 2nd
     history
     host systems
     HP
     IBM
     Juniper Networks, Inc.
    LANs [See LANs (local area networks), topologies.]
     layers
    logical network design
         components
         maintaining
         physical networks
         planning
     manufacturers
     Microsoft
     monitoring
     multi-tiered topologies
     multiple errors
     objects
     OSI models 2nd
     OSI Reference model
     PANs 2nd
     ping command
     protocols 2nd
     R-utilities
         authorization
         rcp
         rlogin
         rsh
         ruptime command
         rwho command
     Red Hat
     reliability
    routers
         Cisco
         configuring
         connections
         hierarchical network organizations
         Internet
         LAN responsibilities, delegating
         managing LAN sizes
         NAT/packet filtering
         ports
         protocols
         security
         selecting
     SANs
         Arbitrated Loops
         fabric switched topology
         Fibre Channel
         IP
         mixed topologies
         selecting
     scatternets
    SCSI [See SCSI (Small Computer Systems Interface).]
    security [See security, fiber-optic cables.]
    segments
         routers
         switches
     selecting
     simple repeaters
     Smaba.org
     sniffers
     SOHO
         backups
         clients
         firewalls
         network topologies
         office applications
         requirements
         routers
         topologies
         vertical-market applications
     speed
     structured wiring
         backbone cabling system
         horizontal cabling system
         work area specification
     switches
         chassis
         collapsed backbones
         cut-through switches 2nd
         full-duplex ethernet
         hardware types
         home offices
         Layer 3 switches
         managing
         results
         segmenting collision domains
         stackable
         store-and-forward switches 2nd
         troubleshooting
    testing
         BERT
         cables
         handheld cable checkers
         impedance
         pulse width
         TDR
         velocity
     topologies
     traceroute command
     traffic
     troubleshooting
         auditing
         documentation
         maintenance
         problem resolution cycle
    Unix [See Unix, NFS, procedures .]
    upgrading
         avoiding sidetracks
         closing
         deploying
         determining needs
         documenting planning
         executing pilot programs
         maintaining support
         mapping
         measuring success
         planning
         restoring
         scheduling downtime
         setting goals
         surveying users
         testing
         tracking
         training
         verifying corporate standards
     VLANs
         explicit tagging
         IEEE switch standards
         implicit tagging
         MAC addresses
         port-based
         protocol rule-based
         switches 2nd
         topologies
    VPNs [See VPNs (Virtual Private Networks).]
    WANs (wide area networks)
         back doors
         forged email
         LANs 2nd
         passwords
         PHY
         preventing attacks
         protocols
         routers
         security
         Trojan horses
         types of attacks
         viruses
    wireless [See wireless networks, topologies of.]
        802.11-based [See 802.11-based networks.]
         ad-hoc networks 2nd
         adapters, installing
         advantages 2nd
         AMA
         APs
         definition
         IEEE 2nd
         interference
         LANs, connecting to
         manual client configuration
         needs, determining
         PANs
         public places
         public spaces
         radio wave transmission
        security [See wireless networks, topologies of ; security, fiber-optic cables.]
         Service Pack 2 wireless network setup wizard
         setup wizard
        SOHO [See SOHO (small offices and home offices), routers.]
         spread-spectrum technologies 2nd
         topologies of
New Local Group dialog box
New Object-Group dialog box
New Object-User dialog box
New Printer Detection dialog box
new technologies
new top-level domains
New User dialog box
newsgroups
NEXT (near-end cross-talk) 2nd 3rd
NFS (Network File System) 2nd 3rd
     configuring
     daemons
     procedures
     RPC
     server-side daemons
     troubleshooting
     XDR
nfsstat commands
NICs (network interface cards)
     Asset/Power Management components
     autosensing
     base I/O ports
     connectors
     hardware bus types
     information, searching
     IRQ
     load balancing
     multi-homed systems
     Remote Wake-Up component
     software drivers
     troubleshooting
     WfM
     WOL
NIS (Network Information Service) 2nd 3rd
     clients
     domainname command
     maps 2nd
     master/slave servers
     slaves
     starting
     yp commands
     ypserve daemon
NIST (National Institute of Standards and Technology)
NMS (network management station)
NNI (Network-Node Interface)
nodes
     5-4-3 rule
     hidden node problems
     ring topologies
noise, testing
nominal velocity of propagation
nonauthenticated commands
nonbroadcast multiple access (NBMA)
nonmaskable interrupts
nonmicrosoft clients
nonshared topologies
nonvolatile memory (NVRAM)
NOOP command 2nd
North American Digital Hierarchy
NOS (network operating system)
notebooks
     802.11g wireless network adapters
     CardBus
notifying users of network upgrades
Novell
    Netware [See NetWare, decline.]
     Open Enterprise Server
     security
Novell Advanced Audit Service (NAAS)
Novell Directory Service (NDS) 2nd 3rd
NPRINTER.NLM
nslookup command
nslookup utility
NT (Windows)
     ActiveState ActivePerl 5.6
    domains
         controllers
         models
         replication between controllers
         trust relationships
         workgroups
     Event Log
     Event Viewer
     groups
         adding users
         assigning membership
         built-in user groups
         creating
     Korn Shell command
     NTFS
     passwords 2nd
     printers
     share-level permissions
     Telnet
     trust relationships
     Unix
    users
         accounts, managing
         name mapping
         permissions
    Windows 2000
         centralized/decentralized management
         domain controllers
         member servers
         migrating
         modeling directories
         namespaces
NTBugTraq
NTFS 2nd
null packet
numbers
     options
     ports
numerical reply codes, FTP
NVRAM (nonvolatile memory)
NVT (Network Virtual Terminal)




Upgrading and Repairing Networks
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2006
Pages: 411

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net