Index N


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

NAAS (Novell Advanced Audit Service)  
NAK (Negative Acknowledgement)   2nd   3rd  
NAK (negative acknowledgment)  
name resolution
       hardware/protocol address comparisons   2nd  
       NetBIOS   2nd  
               LMHOSTS file   2nd   3rd   4th   5th  
               WINS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
names
       BIND (Berkeley Internet Name Domain)  
       domain  
       domains
               NIS (Network Information Service)   2nd  
       NBNS (NetBIOS Name Server)  
       queries   2nd  
       RDN  
       registration   2nd   3rd   4th  
       resolution
               NIS (Network Information Service)   2nd  
               TCP/IP   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th  
               troubleshooting   2nd   3rd  
               Windows 2000 Server  
       users
               mapping   2nd  
               tracking  
namespaces   2nd   3rd  
       contigous  
       X.500   2nd  
               acronyms   2nd   3rd   4th  
               schema  
namespaces.   [See also forests]
naming
       generic accounts  
       mailboxes   2nd  
       objects
               Active Directory   2nd   3rd  
               NetWare   2nd   3rd   4th   5th  
       printers  
       WINS (Windows Internet Naming Service).   [See WINS]
narrowband  
narrwoband   2nd   3rd  
NAS
       selecting   2nd   3rd   4th  
NAS (Network Attached Storage)  
NAT
       routers   2nd  
NAT (Network Address Translation)   2nd   3rd   4th   5th   6th   7th  
National Electrical Code (NEC)  
National Institute of Standards and Technology (NIST)  
navigation   2nd   3rd   4th   5th  
NBMA (nonbroadcast multiple access)  
NBNS (NetBIOS Name Server)  
NBTSTAT command  
NCP
       independence   2nd   3rd   4th  
NCP (NetWare Core Protocol)   2nd   3rd   4th   5th  
       burst mode  
       packet signatures   2nd  
        requests /reposnses   2nd   3rd   4th  
       signature options   2nd   3rd   4th   5th   6th  
       terminating  
       troubleshooting packet signatures   2nd  
NCP (Network Control Protocol)   2nd   3rd  
NCP (Novell Core Protocol)  
NDIS (Network Driver Interface Specification)   2nd  
NDS
       Bindery
               comapring   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
       rights
               comparing  
               inheritance of   2nd   3rd   4th  
NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th  
       configuring   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th  
NDS (Novell Directory Service)  
NDS (Novell Directory Service).   [See also NetWare]
NDS (Novell Directory Services)  
NDS Manager
       applying  
               creating replicas   2nd   3rd  
               partitioning   2nd  
               synchronizing servers   2nd  
near-end cross-talk (NEXT)  
Near-End Cross-Talk (NEXT)   2nd  
near-end cross-talk (NEXT)  
NEC (National Electrical Code)  
Negative Acknowledgement (NAK)   2nd   3rd  
negative acknowledgment (NAK)  
negotiation
       protocols
               SMB   2nd  
negotiations
       Telnet options   2nd   3rd   4th   5th   6th   7th   8th  
Nelson, Ted  
NET commands  
       NET SHARE   2nd   3rd  
       NET STATISTICS   2nd   3rd   4th  
       NET USE   2nd   3rd  
       NET VIEW   2nd   3rd  
NetBIOS
       name resolution   2nd  
               LMHOSTS file   2nd   3rd   4th   5th  
               WINS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
NetBIOS Name Server (NBNS)  
NETGEAR  
netsh commands   2nd   3rd  
netstat command   2nd   3rd   4th   5th   6th   7th  
netstate command   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
Netware
       administration   2nd   3rd  
NetWare
       applications   2nd   3rd   4th  
       connection-oriented services   2nd  
       connectionless services   2nd  
       directories
               interoperability   2nd  
               selecting   2nd  
       Directory Service.   [See NDS]
       directory structures   2nd  
               Bindery   2nd  
               Bindery Services   2nd   3rd   4th   5th  
               comparing Bindery/NDS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
               configuring NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th  
               NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th  
       eDirectory  
               features   2nd   3rd   4th  
               installing   2nd   3rd   4th  
       files
               sharing   2nd  
       iPrint utility   2nd  
       IPX (Internetwork Packet Exchange)   2nd  
                frames   2nd  
               packets   2nd   3rd   4th   5th  
       linux
               comparing   2nd   3rd   4th   5th  
       Linux
               moving user accounts   2nd   3rd  
               providing services   2nd   3rd  
               user authentication  
       login  
       NCP
               independence   2nd   3rd   4th  
       NCP (NetWare Core Protocol)   2nd  
               packet signatures   2nd  
               signature options   2nd   3rd   4th   5th   6th  
               troubleshooting packet signatures   2nd  
       NWADMN32   2nd   3rd  
       objects
               creating   2nd   3rd   4th   5th   6th   7th   8th  
               recoginition   2nd  
       permissions   2nd  
               comparing NDS/file system rights  
               configuring   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  
               Everyone group   2nd  
               file system rights   2nd  
               inheritance of rights   2nd   3rd   4th  
               object/property rights   2nd   3rd   4th  
               trustees  
               Windows 2000/2003   2nd   3rd   4th   5th   6th   7th   8th  
       printers
               sharing   2nd  
       printing   2nd   3rd  
               NPRINTER.NLM   2nd  
               Print Queue object properties   2nd  
               Print Server object properties   2nd  
               Printer object properties   2nd   3rd  
               PSERVER.NLM   2nd  
       protocols   2nd   3rd   4th   5th   6th  
       resources
               accessing  
       security  
               AUDITCON/SYSCON utilities   2nd   3rd   4th   5th   6th  
       Security Equivalance   2nd  
       SPX (Sequenced Packet Exchange)   2nd  
               communications   2nd  
               packets   2nd  
               SPXII   2nd  
       TCP/IP  
NetWare 6
       auditing   2nd  
NetWare Core Protocol (NCP)   2nd   3rd   4th   5th  
       burst mode  
       packet signatures   2nd  
       requests/responses   2nd   3rd   4th  
       signature options   2nd   3rd   4th   5th   6th  
       terminating  
       troubleshooting packet signatures   2nd  
NetWare Link Services Protocol (NLSP)  
NetWare Loadable Module (NLM)  
NetWare Name Service (NSS)  
NetWare version 6
       LANs   2nd  
netwoks
       structured wiring   2nd  
               backbone cabling system   2nd   3rd   4th  
               horizontal cabling system   2nd   3rd  
               work area specification  
Network Address Translation (NAT)   2nd   3rd   4th   5th   6th   7th  
Network Attached Storage.   [See NAS]
Network Connection Policy   2nd  
Network Control Protocol (NCP)   2nd   3rd  
Network Driver Interface Specification (NDIS)   2nd  
Network File System (NFS)   2nd   3rd   4th   5th  
       configuring  
       daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       procedures   2nd   3rd   4th  
       RPC   2nd   3rd  
       server-side daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
       troubleshooting   2nd   3rd   4th  
       XDR   2nd  
Network Information Service (NIS)   2nd  
Network Information Service.   [See NIS]
Network Information System (NIS)   2nd  
Network Interface Card (NIC)  
network interface card.   [See NIC]
Network layer   2nd  
network management station (NMS)  
network operating system (NOS)  
Network Printer Server  
Network Virtual Terminal (NVT)   2nd  
Network-Node Interface (NNI)  
Networking Services dialog box   2nd  
networks
       10Base-2
               upgrading to 10Base-T networks   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  
       802.11b
               applying   2nd   3rd  
               distance limitations  
               firewalls   2nd  
       adapter cards   2nd  
       adapters
               troubleshooting  
       analyzers   2nd   3rd   4th   5th  
               decoding protocols  
               establishing baselines   2nd   3rd  
               filtering protocols   2nd  
               hardware   2nd   3rd  
               software   2nd   3rd   4th   5th   6th  
               software LAN   2nd   3rd  
               statistical data   2nd  
       Anixter  
       applications
               Linux/NetWare   2nd   3rd   4th  
       ARCnet   2nd  
               adapter cards   2nd  
               addressing   2nd   3rd   4th   5th   6th   7th   8th   9th  
               bus topologies   2nd  
               configuring   2nd  
               connecting to ethernets   2nd  
               star topologies   2nd  
               troubleshooting   2nd   3rd  
               wiring   2nd  
       auditing   2nd  
       back doors   2nd  
       backbones
               upgrading   2nd  
       Bluetooth.   [See Bluetooth]
       BOOTP   2nd  
               client/server exchanges (DHCP)   2nd   3rd   4th   5th   6th   7th   8th   9th  
               customizing DHCP   2nd   3rd   4th   5th  
               DHCP   2nd   3rd   4th   5th   6th   7th  
               downloading operating systems   2nd  
               options fields   2nd   3rd   4th   5th  
               packet formats   2nd   3rd   4th   5th  
               request/reply mechanisms   2nd   3rd   4th  
       broadband local area
               IEEE 802.7   2nd  
       broadcast storms   2nd  
       cable connectors
               10Base-2 networks   2nd  
       cabling   2nd  
       Cisco  
       configuring
               troubleshooting   2nd  
       congestion  
       connections
               different cables/topologies  
       connectors   2nd  
       devices  
       dial-up connections  
               configuring Windows Professional Client   2nd   3rd   4th   5th  
               optimizing   2nd  
               PPP (Point-to-Point Protocol)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  
               SLIP (Serial Line Internet Protocol)   2nd   3rd   4th   5th   6th   7th  
       directories
               interoperability   2nd  
               selecting   2nd  
       encryption  
               digital certificates   2nd   3rd   4th  
               SSL handshakes   2nd  
       ethernets
               backoff algorithm   2nd  
               buses, hubs, and switches   2nd   3rd  
               collisions   2nd   3rd   4th   5th   6th  
               history of   2nd   3rd  
       Ethernets
                phasing into Token-Ring networks   2nd   3rd   4th   5th   6th   7th  
               replacing Token-Ring equipment  
               routing   2nd  
       ethernets
               types of   2nd   3rd   4th   5th   6th   7th  
       Ethernets
               upgrading   2nd   3rd   4th  
       history of   2nd   3rd   4th  
       host systems
               troubleshooting   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  
       HP  
       IBM  
       IEEE 802.11g  
               increasing bandwidth   2nd  
       Juniper Networks, Inc.  
       LAN
               bridging topologies  
               building   2nd   3rd  
               bus topologies   2nd   3rd   4th  
               campus networks   2nd   3rd   4th  
               hybrid topologies   2nd   3rd  
               layer-3 switching  
               mesh topologies  
               nonshared/shared topologies   2nd   3rd  
               ring topologies   2nd   3rd  
               routing topologies   2nd  
               segmenting   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  
               star topologies   2nd  
               topologies   2nd  
               VLANs   2nd  
       LAN.   [See also LAN]
       laying out   2nd   3rd   4th   5th  
       LinkSys  
       logical network design
                components   2nd   3rd   4th   5th   6th   7th   8th   9th  
               maintaining  
               physical networks  
               planning   2nd   3rd   4th   5th   6th   7th  
       Micorsoft  
       monitoring   2nd  
       multi-tiered topologies   2nd   3rd   4th  
       multiple errors  
       NETGEAR  
       NetWarre
               printing  
       objects   2nd   3rd   4th   5th  
       OSI models   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       OSI Reference model
               TCP/IP   2nd   3rd   4th   5th   6th  
       piconets   2nd  
       ping command   2nd   3rd  
       protocols   2nd  
               adding stacks   2nd  
               Linux/NetWare  
       R-utilities  
               authorization   2nd   3rd  
               rcp   2nd   3rd  
               rlogin   2nd   3rd   4th   5th   6th   7th   8th  
               rsh   2nd   3rd   4th  
                ruptime command   2nd  
               rwho command   2nd  
       RedHat  
       reliability   2nd  
       routers
               Cisco   2nd   3rd   4th  
               configuring   2nd   3rd  
               connections   2nd   3rd  
               delegating LAN responsibilities   2nd   3rd  
               hierarchical network organizations   2nd  
               Internet   2nd  
               managing LAN sizes   2nd   3rd   4th   5th  
               NAT/packet filtering   2nd  
               ports   2nd   3rd   4th  
               protocols   2nd  
               security   2nd  
               selecting   2nd  
       SAN  
       SANs.   [See also SANs]
       scatternets   2nd  
       SCSI
               applying NAS and SANs   2nd  
               Arbitrated Loops (SANs)   2nd   3rd   4th   5th   6th   7th   8th   9th  
               capacity (NAS)   2nd   3rd   4th  
               connections   2nd  
               fabric switched topology (SANs)   2nd   3rd   4th   5th  
               Fibre Channel (SANs)   2nd   3rd   4th  
               IP (SANs)   2nd   3rd  
               mixed topologies (SANs)   2nd   3rd   4th  
               NAS   2nd  
               network appliances (NAS)   2nd  
               protocols (NAS)   2nd  
               SANs   2nd   3rd   4th  
       security   2nd   3rd  
               access control mechanisms   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
               auditing   2nd  
               delegating authority   2nd   3rd   4th   5th  
               disabling default options   2nd  
               firewalls   2nd  
               physical measures   2nd   3rd   4th   5th   6th   7th  
               policies   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  
               policies and procedures  
               services and system daemons   2nd  
       segments
               routers   2nd   3rd   4th   5th  
               switches   2nd   3rd  
       simple repeaters  
       Smaba.org  
       sniffers   2nd  
       SOHO   2nd  
                backups   2nd  
               requirements   2nd   3rd   4th   5th  
               topologies   2nd   3rd   4th  
               vertical-market applications   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       SOHO (Small Office and Home Office)
               troubleshooting  
       speed
               selecting NICs   2nd  
       switches   2nd   3rd  
               chassis  
                collapsed backbones   2nd   3rd   4th   5th  
               cut-through switches   2nd   3rd  
                full-duplex ethernet   2nd   3rd   4th  
               hardware types   2nd   3rd   4th  
               home offices   2nd  
               Layer 3 switches   2nd  
               managing  
               results  
               segmenting collison domains   2nd  
                stackable  
               store-and-forward switches   2nd  
               troubleshooting  
       testing
               BERT (Bit Rate Error Testers)   2nd  
               cable testers   2nd  
               cables   2nd   3rd  
               handheld cable checkers  
               impedance   2nd  
               pulse width  
               TDR (time domain reflectometer)   2nd   3rd  
               velocity   2nd  
       topologies
               troubleshooting  
       traceroute command   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th  
       traffic
               evaluating upgrades  
       troubleshooting   2nd   3rd   4th  
               auditing   2nd  
               documentation   2nd   3rd   4th   5th  
               maintenance   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
               problem resolution cycle   2nd   3rd   4th   5th   6th   7th   8th  
       Unix.   [See Unix]
       upgrading
               avoiding sidetracks   2nd  
               closing  
               deploying   2nd   3rd  
               determining needs for   2nd   3rd   4th   5th   6th   7th  
               documenting planning   2nd  
               executing pilot programs   2nd  
               maintaining support   2nd  
               mapping   2nd   3rd  
               measuring success   2nd  
               planning   2nd  
               restoring   2nd  
               scheduling downtime  
               setting goals  
                surveying users   2nd   3rd  
               testing   2nd   3rd   4th  
               tracking  
               training   2nd  
               verifying corporate standards   2nd  
       VLAN.   [See VLAN]
       VPN (virtual private network).   [See VPN]
       WAN
               routers   2nd  
       WANs (wide area networks)
               back doors   2nd  
               forged e-mail   2nd  
               passwords   2nd  
               preventing attacks   2nd   3rd  
               Trojan horses   2nd  
               viruses   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  
       wireless   2nd   3rd   4th  
               ad-hoc   2nd   3rd   4th  
               AMA  
               APs (access points)   2nd   3rd   4th   5th  
               connecting  
               HomeRF technology  
               IEEE  
               IEEE 802.11   2nd  
               IEEE 802.11;MAC layer   2nd   3rd   4th  
               IEEE 802.11;Physical layer   2nd   3rd  
               interference   2nd   3rd  
               PAN   2nd   3rd  
               public use of   2nd  
               radio wave transmission  
               security   2nd  
               selecting   2nd  
               spread-spectrum technology   2nd   3rd   4th  
               WAN (wide area network)   2nd   3rd   4th  
               Wi-Fi Alliance  
       wireless adapters
               installing   2nd   3rd   4th   5th   6th   7th   8th  
new features
       eDirectory   2nd   3rd   4th  
New Local Group dialog box  
New Object-Group dialog box  
New Object-User dialog box  
New Printer Detection dialog box  
new technology
       determining needs for network upgrades   2nd  
new top-level domains   2nd  
New User dialog box   2nd  
NEXT (near-end cross-talk)  
NEXT (Near-End Cross-Talk)   2nd  
NEXT (near-end cross-talk)  
Next Node Identification (NID)  
NFS (Network File System)   2nd   3rd   4th   5th  
       configuring  
       daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       procedures   2nd   3rd   4th  
       RPC   2nd   3rd  
       server-side daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
       troubleshooting   2nd   3rd   4th  
       XDR   2nd  
nfsstat command  
nfsstat s commands  
NIC
       Asset/Power Management components  
       autosensing   2nd  
       base I/O ports   2nd   3rd  
       connectors   2nd  
       hardware bus types
               selecting   2nd   3rd   4th   5th   6th   7th   8th   9th  
       information
               searching  
       IRQ (Interrupt ReQuest Line)   2nd   3rd   4th  
       load balancing   2nd  
       multi- homed systems   2nd  
       Remote Wake-Up component   2nd   3rd   4th   5th  
       software drivers  
               NDIS (Network Driver Interface Specification)   2nd  
               ODI (Open Data-Link Interface)   2nd  
               Packet Drivers   2nd  
       troubleshooting   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
               Linux configurations   2nd   3rd  
       WfM (Wired for Management)   2nd  
               Universal Network Boot  
       WOL (Wake on LAN)   2nd  
               Universal Network Boot  
       WOL-compliant network cards   2nd  
NIC (network interface card)  
NIC (Network Interface Card)  
NID (Next Node Identification)  
NIS (Network Information Service)   2nd   3rd   4th  
        clients  
       domainname command   2nd  
       maps   2nd   3rd   4th   5th  
               modifying   2nd  
       master/slave servers  
       slaves   2nd   3rd  
       starting   2nd   3rd  
       yp commands   2nd  
       ypserve daemon  
NIS (Network Information System)   2nd  
NIST (National Institute of Standards and Technology)  
NLM (NetWare Loadable Module)  
NLSP (NetWare Link Services Protocol)  
NMS (network management station)  
NNI (Network-Node Interface)  
nodes
       5-4-3 rule   2nd  
       hidden  
       ring topologies  
noise
       testing  
nominial velocity of propogation  
non-authenticated commands   2nd  
non-maskable interrupts  
non-microsoft clients
       Samba   2nd   3rd  
nonbraodcast multiple access (NBMA)  
nonshared topologies   2nd   3rd  
nonvoliatile memory (NVRAM)  
NOOP command   2nd  
North American Digital Hierarchy  
Norton Internet Security 2003  
NOS (network operating system)  
notification of delivery   2nd  
notifying users of network upgrades   2nd  
Novell
       connection-oriented services   2nd  
       connectionless services   2nd  
       directory structures   2nd  
               Bindery   2nd  
               Bindery Services   2nd   3rd   4th   5th  
               comparing Bindery/NDS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
               configuring NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th  
               NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th  
       IPX (Internetwork Packet Exchange)   2nd  
               packets   2nd   3rd  
       NCP
               independence   2nd   3rd   4th  
       NCP (NetWare Core Protocol)   2nd  
               packet signatures   2nd  
               signature options   2nd   3rd   4th   5th   6th  
               troubleshooting packet signatures   2nd  
       protocols   2nd   3rd   4th   5th  
       security  
               AUDITCON/SYSCON utilites   2nd   3rd   4th   5th   6th  
Novell Advanced Audit Service (NAAS)  
Novell Core Protocol (NCP)  
Novell Directory Service  
Novell Directory Service (NDS)  
Novell Directory Service (NDS).   [See also NetWare]
Novell Directory Services (NDS)  
Novell Netware
       migrating to Windows NT 4.0/2000   2nd   3rd  
               CSNW   2nd   3rd   4th  
               GSNW   2nd   3rd   4th   5th   6th   7th  
               SFN   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th  
NPRINTER.NLM   2nd  
nslookup command   2nd   3rd  
nslookup utility   2nd  
NSS (NetWare Name Service)  
NTBugTraq   2nd  
NTFS
       permissions  
               Windows NT  
null packet  
numbers
       options  
       ports
               filtering   2nd   3rd   4th  
numerical reply codes, FTP  
NVRAM (nonvoliatile memory)  
NVT (Network Virtual Terminal)   2nd  
NWADMN32 utility   2nd   3rd  



Upgrading and Repairing Networks
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2003
Pages: 434

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net