P



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

p-node clients
pac command
Packet Drivers
Packet Header field
packets
     Bluetooth
     BOOTP
     Configure-Request
     DHCP
     DHCPINFORM
    ethernets
         802.2 LLC standard
         802.3 standard
         Ethernet II/PARC
         frames
     filtering 2nd 3rd
         intrusion detection
         routers
     magic
page messages
Palms
Palo Alto Research Center (PARC) 2nd
PAM (Password Authentication Manager)
panel patches 2nd 3rd
PANs (personal area networks) 2nd 3rd
paper documentation
PAR (Project Authorization Request)
parameters
     -debug
     -nobsd
     -nofork
     passwords
     Unix
PARC (Palo Alto Research Center) 2nd
parity checks
park mode
partial mesh topologies
partial synchronization
partitioning Active Directory
partner servers
pass-through authentication
passband technologies
passive open connections
password Authentication Manager (PAM)
passwords
     clear-text
     construction guidelines
     default passwords, changing
     grabbers
     interdomain trust relationships
     policies 2nd
         account lockouts
         expirations
         history lists
         managing
     smart cards
     synchronizing
     tracking
     Unix
     Windows NT
patches (panels) 2nd 3rd
Pathworks
pattern hopping
Payload Type (PT)
PC cards
PC-cillin Internet Security suite
PCF (Point Coordination Function)
PCI (Peripheral Component Interconnect) 2nd
PCL (Printer Control Language)
PCL.SEP
PCMCIA
PCS (Physical Coding Sublayer)
PDAs (Personal Digital Assistants)
     BlackBerries
     features of
     overview
     portable media centers, compared
     smartphones, compared
PDCs (primary domain controllers) 2nd 3rd
PDU (Protocol Data Unit)
peer-to-peer networking models
performance
     cables
     NAS
Peripheral Component Interconnect (PCI) 2nd
permanent virtual connection (PVC)
permissions
     cumulative effects of
     Linux
     NetWare
         comparing NDS/file system rights
         Everyone group
         file system rights
         inheritance of rights
         object/property rights
         trustees
     NTFS 2nd
     SGID
     share-level
     SUID
     Unix
     user-level
personal area networks (PANs) 2nd 3rd
Personal Digital Assistants [See PDAs (Personal Digital Assistants), overview.]
Personal Information Managers (PIMs)
personnel, network upgrades
PGP (Pretty Good Privacy) 2nd
phones
     2.4GHz cordless telephone
     smartphones
PHY (Physical layer) 2nd
     802.11 networks
     ATM
     IEEE 802
     IEEE 802.11 standards
Physical Coding Sublayer (PCS)
physical interface cards (PICs)
Physical layer [See PHY (Physical layer).]
physical measures (network security)
Physical Media Dependent (PMD) 2nd
physical networks, planning
physical topologies 2nd 3rd
Piano
piconets
PICs (physical interface cards)
PID (process ID)
pilot programs
PIMs (Personal Information Managers)
ping command 2nd 3rd 4th
Ping of Death
piracy
pitfalls of troubleshooting
Plain Old Telephone Service (POTS)
planning
     components
     disaster recovery
     logical network design
     maintenance
    migration
         arranging domains
         BDCs, upgrading
         centralized/decentralized management
         domain controllers
         implementing to Active Directories
         joining trees
         master domain model
         member servers
         modeling directories
         namespaces
         PDCs, upgrading
    networks
         avoiding sidetracks
         closing
         deploying
         documenting upgrades
         executing pilot programs
         measuring success
         restoring
         scheduling downtime
         setting goals
         testing
         training
         upgrading
         verifying corporate standards
     physical networks
     upgrading
PLOGI (Port Login)
plugs
PMD (Physical Media Dependent) 2nd
Point Coordination Function (PCF)
point-to-point connections (leased lines)
     Fractional T1
     T-carrier system
     troubleshooting T-carrier system
Point-to-Point Protocol over Ethernet (PPPoE) 2nd
policies 2nd
    auditing, configuring
         Windows 2000/2003
         Windows NT 4.0
     passwords 2nd
     security
         acceptable use statements
         elements to include
         escalation procedures
         guidelines for usage
         Network Connection Policy
         passwords
poll packets
pools (printers)
POP3 (Post Office Protocol)
Port Forwarding/Triggering dialogs
Port Login (PLOGI)
portable media centers
ports
     back doors
     base I/O
     filtering
     FTP
     identifiers
     IP addresses
     legacy compatibility
     numbers
     routers
     switches
     TCP
     UDP
     uplink
     VLAN (virtual LAN)
     Windows NT
Positive Completion replies
Positive Intermediate replies
Post Office Protocol (POP3)
post-implementation reviews
PostScript
POTS (Plain Old Telephone Service)
power conditioning
Power Management component
power problems (SOHO networks)
power strips
Power SUM
PPP (Point-to-Point Protocol) 2nd
     frames
     LCP
     NCP
     RFCs
     Windows 2000 Professional Client
PPPoE (Point-to-Point Protocol over Ethernet) 2nd
PPTP (Point-to-Point Tunneling Protocol)
     selecting for wireless networks
     VPNs
pr command
PRBS (pseudorandom binary sequence)
Pre-Shared Key (PSK)
Preboot Execution Environment (PXE)
predefined groups
Presentation layer
Pretty Good Privacy (PGP) 2nd
prevention
    attacks
         digital certificates
         WANs
     down time
    maintenance
         backups
         disaster recovery
         documenting
         network monitoring
         NICs
         redundancy
         routine
         UPS
     network congestion
     security measures
         host computers
         routers
         training
         Tripwire
         updating
         virus-checking applications
PRI (Primary Rate Interface)
primary domain controllers (PDCs) 2nd 3rd
primary servers
primitives 2nd
Print Operators group
Print Server
Printer Control Language (PCL)
printers
     auditing
     events
     naming
     Properties
     searching
     Server Properties
     sharing
     troubleshooting
     Unix/Linux compared to NetWare
     Web browsers
     Windows NT
printing
     FORTRAN
     hardware-based print servers
     IPP
     languages
     NetWare
         NPRINTER.NLM
         properties
         PSERVER.NLM
     print server applications
     protocols
         BSD
         IPP
         TCP/IP
     statistics
     Unix
     Windows 2000
     Windows NT 4.0
    Windows print servers
         adding printers
         printers/printing devices
     Windows XP Professional
PrintQueue object
privacy
private keys
privileges [See also rights, Windows NT, groups .]
problem resolution cycle
procedures 2nd
     NFS
     security
     troubleshooting
process ID (PID)
process of elimination, troubleshooting
profiles
     Bluetooth
         Cordless Telephony
         Dial-Up Networking
         Generic Access
         Headset
         Intercom
         Serial Port
         Service Discovery Application
     users
Project Authorization Request (PAR)
promiscuous mode 2nd
properties
     Document
     FTP
     MMC 2nd
     NetWare
     Print Queue object
     Print Server 2nd
     Printer
     Printer object properties
property set attribute
proprietary extensions
     802.11a
     802.11b
     802.11g
protection [See security, routers.]
protocols
     analyzers
         decoding protocols
         establishing baselines
         filtering protocols
         hardware
         software
         statistical data
     ARP
     Bluetooth
     BOOTP 2nd
         client/server exchanges (DHCP)
         DHCP
         downloading operating systems
         options fields
         packet formats
         relay agents
         request/reply mechanisms
         support
     BSD
     configuring routers
     DECnet
     DHCP 2nd 3rd
         allocation
         APIPA
         authorizing servers
         BOOTP 2nd
         client/server exchanges
         clustering
         configuring
         customizing
         daemons
         DNS
         exclusions/reservations
         installing servers
         large/routed environments
         leasing servers
         managing logging
         MMC Action menu
         Red Hat Linux
         relay agents 2nd
         troubleshooting
     DISP
     EGP
     file servers
     filtering
     FTP
         commands
         data transfers
         firewalls
         ports/processes
         Red Hat Linux
         replies
         TFTP
         Windows command-line clients
     HELLO
     HTTP
     ICMP 2nd
     IGMP
     IGP
     IMAP4
         client commands
         commands
         data formatting
         mailbox naming
         states
         system flags
         universal commands
     IP 2nd
         addressing
         ARP
         connections
         datagram headers
         Fibre Channel
         implementing
         proxy ARP
         RARP
         SANs
         subnetting
         supernetting
         unacknowledged protocol
         unreliable protocol
     IPCP
     IPP
         installing
         object types
         operations
         Version 1.1
         Windows 2000
     IPv6
         comparing to IPv4
         extension headers
         headers
         Options Type field
     IPXCP
     ISAKMP
     L2CAP
     LAN
     LCP
     LDAP 2nd
         binding requests
         comparing databases
         databases
         directories
         interoperability between directories
         metadirectories
         X.500
     limitations
     LMP (Link Manager Protocol)
     lpr/lpd
     Mount 2nd
     multi-protocol label switching
     name resolution
     NAS
     NCP (NetWare Core Protocol) 2nd 3rd
         burst mode
         requests/responses
         terminating
     NetWare version 6
     NFS 2nd
         configuring
         daemons
         procedures
         RPC
         server-side daemons
         troubleshooting
         XDR
     OBEX
     OSI
     POP3
     PPP
         configuring Windows 2000 Professional Client
         LCP
         NCP
         RFCs
     RARP 2nd
     RIP
         router updates
         scalability
         version 2
     RMON (Remote Monitoring Protocol) 2nd
     routers 2nd
     SAP
     SDP
     selecting
     SLIP
     SMB
         CIFS
         files
         negotiation
         NET commands
         Samba
     SMTP (Simple Mail Transfer Protocol) 2nd
         commands
         extensions
         models
         response codes
         transactions
     SNMP 2nd 3rd 4th
         MIB
         primitives
         proxy agents
         RMON
         SNMPv2/SNMPv3
     Spanning Tree
     stacks 2nd 3rd
     stateful
     stateless
     TCP 2nd
         configuring sessions
         connections
         ending sessions
         headers
         LANs
         managing sessions
         security
         sessions
    TCP/IP
         name resolution
         OSI Reference model
         Unix
     TCS
     Telnet
         authentication
         commands
         NVT
     TFTP
     UDP 2nd 3rd
         headers
         ICMP interaction
     UNIX
         BOOTP
         DHCP
         FTP
         TCP/IP 2nd
         telnet
         Telnetxxx
     VLAN
     VPNs
         AH
         ESP
         IKE
         IPSec
         L2TP
         PPTP
     WANs
protocols Data Unit (PDU)
proxy agents
proxy applications
proxy ARP (Address Resolution Protocol)
proxy servers 2nd 3rd 4th
Proxy Settings dialog box
PSCRIPT.SEP
PSERVER.NLM
pseudorandom binary sequence (PRBS)
PSK (Pre-Shared Key)
PSTN (public switched telephone network) 2nd 3rd 4th 5th 6th
PT (Payload Type)
Public group
public keys 2nd
public places, wireless networks
public switched telephone network (PSTN) 2nd 3rd 4th 5th
pulling records
pulse width, configuring
pushing records
PVC (permanent virtual connection)
PXE (Preboot Execution Environment)




Upgrading and Repairing Networks
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2006
Pages: 411

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net