[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] NAAS (Novell Advanced Audit Service) NAK (Negative Acknowledgement) 2nd 3rd NAK (negative acknowledgment) name resolution hardware/protocol address comparisons 2nd NetBIOS 2nd LMHOSTS file 2nd 3rd 4th 5th WINS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th names BIND (Berkeley Internet Name Domain) domain domains NIS (Network Information Service) 2nd NBNS (NetBIOS Name Server) queries 2nd RDN registration 2nd 3rd 4th resolution NIS (Network Information Service) 2nd TCP/IP 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th troubleshooting 2nd 3rd Windows 2000 Server users mapping 2nd tracking namespaces 2nd 3rd contigous X.500 2nd acronyms 2nd 3rd 4th schema namespaces. [See also forests] naming generic accounts mailboxes 2nd objects Active Directory 2nd 3rd NetWare 2nd 3rd 4th 5th printers WINS (Windows Internet Naming Service). [See WINS] narrowband narrwoband 2nd 3rd NAS selecting 2nd 3rd 4th NAS (Network Attached Storage) NAT routers 2nd NAT (Network Address Translation) 2nd 3rd 4th 5th 6th 7th National Electrical Code (NEC) National Institute of Standards and Technology (NIST) navigation 2nd 3rd 4th 5th NBMA (nonbroadcast multiple access) NBNS (NetBIOS Name Server) NBTSTAT command NCP independence 2nd 3rd 4th NCP (NetWare Core Protocol) 2nd 3rd 4th 5th burst mode packet signatures 2nd requests /reposnses 2nd 3rd 4th signature options 2nd 3rd 4th 5th 6th terminating troubleshooting packet signatures 2nd NCP (Network Control Protocol) 2nd 3rd NCP (Novell Core Protocol) NDIS (Network Driver Interface Specification) 2nd NDS Bindery comapring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th rights comparing inheritance of 2nd 3rd 4th NDS (NetWare Directory Service) 2nd 3rd 4th 5th 6th 7th 8th 9th configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th NDS (Novell Directory Service) NDS (Novell Directory Service). [See also NetWare] NDS (Novell Directory Services) NDS Manager applying creating replicas 2nd 3rd partitioning 2nd synchronizing servers 2nd near-end cross-talk (NEXT) Near-End Cross-Talk (NEXT) 2nd near-end cross-talk (NEXT) NEC (National Electrical Code) Negative Acknowledgement (NAK) 2nd 3rd negative acknowledgment (NAK) negotiation protocols SMB 2nd negotiations Telnet options 2nd 3rd 4th 5th 6th 7th 8th Nelson, Ted NET commands NET SHARE 2nd 3rd NET STATISTICS 2nd 3rd 4th NET USE 2nd 3rd NET VIEW 2nd 3rd NetBIOS name resolution 2nd LMHOSTS file 2nd 3rd 4th 5th WINS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th NetBIOS Name Server (NBNS) NETGEAR netsh commands 2nd 3rd netstat command 2nd 3rd 4th 5th 6th 7th netstate command 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th Netware administration 2nd 3rd NetWare applications 2nd 3rd 4th connection-oriented services 2nd connectionless services 2nd directories interoperability 2nd selecting 2nd Directory Service. [See NDS] directory structures 2nd Bindery 2nd Bindery Services 2nd 3rd 4th 5th comparing Bindery/NDS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th configuring NDS (NetWare Directory Service) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th NDS (NetWare Directory Service) 2nd 3rd 4th 5th 6th 7th 8th 9th eDirectory features 2nd 3rd 4th installing 2nd 3rd 4th files sharing 2nd iPrint utility 2nd IPX (Internetwork Packet Exchange) 2nd frames 2nd packets 2nd 3rd 4th 5th linux comparing 2nd 3rd 4th 5th Linux moving user accounts 2nd 3rd providing services 2nd 3rd user authentication login NCP independence 2nd 3rd 4th NCP (NetWare Core Protocol) 2nd packet signatures 2nd signature options 2nd 3rd 4th 5th 6th troubleshooting packet signatures 2nd NWADMN32 2nd 3rd objects creating 2nd 3rd 4th 5th 6th 7th 8th recoginition 2nd permissions 2nd comparing NDS/file system rights configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th Everyone group 2nd file system rights 2nd inheritance of rights 2nd 3rd 4th object/property rights 2nd 3rd 4th trustees Windows 2000/2003 2nd 3rd 4th 5th 6th 7th 8th printers sharing 2nd printing 2nd 3rd NPRINTER.NLM 2nd Print Queue object properties 2nd Print Server object properties 2nd Printer object properties 2nd 3rd PSERVER.NLM 2nd protocols 2nd 3rd 4th 5th 6th resources accessing security AUDITCON/SYSCON utilities 2nd 3rd 4th 5th 6th Security Equivalance 2nd SPX (Sequenced Packet Exchange) 2nd communications 2nd packets 2nd SPXII 2nd TCP/IP NetWare 6 auditing 2nd NetWare Core Protocol (NCP) 2nd 3rd 4th 5th burst mode packet signatures 2nd requests/responses 2nd 3rd 4th signature options 2nd 3rd 4th 5th 6th terminating troubleshooting packet signatures 2nd NetWare Link Services Protocol (NLSP) NetWare Loadable Module (NLM) NetWare Name Service (NSS) NetWare version 6 LANs 2nd netwoks structured wiring 2nd backbone cabling system 2nd 3rd 4th horizontal cabling system 2nd 3rd work area specification Network Address Translation (NAT) 2nd 3rd 4th 5th 6th 7th Network Attached Storage. [See NAS] Network Connection Policy 2nd Network Control Protocol (NCP) 2nd 3rd Network Driver Interface Specification (NDIS) 2nd Network File System (NFS) 2nd 3rd 4th 5th configuring daemons 2nd 3rd 4th 5th 6th 7th 8th 9th 10th procedures 2nd 3rd 4th RPC 2nd 3rd server-side daemons 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th troubleshooting 2nd 3rd 4th XDR 2nd Network Information Service (NIS) 2nd Network Information Service. [See NIS] Network Information System (NIS) 2nd Network Interface Card (NIC) network interface card. [See NIC] Network layer 2nd network management station (NMS) network operating system (NOS) Network Printer Server Network Virtual Terminal (NVT) 2nd Network-Node Interface (NNI) Networking Services dialog box 2nd networks 10Base-2 upgrading to 10Base-T networks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 802.11b applying 2nd 3rd distance limitations firewalls 2nd adapter cards 2nd adapters troubleshooting analyzers 2nd 3rd 4th 5th decoding protocols establishing baselines 2nd 3rd filtering protocols 2nd hardware 2nd 3rd software 2nd 3rd 4th 5th 6th software LAN 2nd 3rd statistical data 2nd Anixter applications Linux/NetWare 2nd 3rd 4th ARCnet 2nd adapter cards 2nd addressing 2nd 3rd 4th 5th 6th 7th 8th 9th bus topologies 2nd configuring 2nd connecting to ethernets 2nd star topologies 2nd troubleshooting 2nd 3rd wiring 2nd auditing 2nd back doors 2nd backbones upgrading 2nd Bluetooth. [See Bluetooth] BOOTP 2nd client/server exchanges (DHCP) 2nd 3rd 4th 5th 6th 7th 8th 9th customizing DHCP 2nd 3rd 4th 5th DHCP 2nd 3rd 4th 5th 6th 7th downloading operating systems 2nd options fields 2nd 3rd 4th 5th packet formats 2nd 3rd 4th 5th request/reply mechanisms 2nd 3rd 4th broadband local area IEEE 802.7 2nd broadcast storms 2nd cable connectors 10Base-2 networks 2nd cabling 2nd Cisco configuring troubleshooting 2nd congestion connections different cables/topologies connectors 2nd devices dial-up connections configuring Windows Professional Client 2nd 3rd 4th 5th optimizing 2nd PPP (Point-to-Point Protocol) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th SLIP (Serial Line Internet Protocol) 2nd 3rd 4th 5th 6th 7th directories interoperability 2nd selecting 2nd encryption digital certificates 2nd 3rd 4th SSL handshakes 2nd ethernets backoff algorithm 2nd buses, hubs, and switches 2nd 3rd collisions 2nd 3rd 4th 5th 6th history of 2nd 3rd Ethernets phasing into Token-Ring networks 2nd 3rd 4th 5th 6th 7th replacing Token-Ring equipment routing 2nd ethernets types of 2nd 3rd 4th 5th 6th 7th Ethernets upgrading 2nd 3rd 4th history of 2nd 3rd 4th host systems troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th HP IBM IEEE 802.11g increasing bandwidth 2nd Juniper Networks, Inc. LAN bridging topologies building 2nd 3rd bus topologies 2nd 3rd 4th campus networks 2nd 3rd 4th hybrid topologies 2nd 3rd layer-3 switching mesh topologies nonshared/shared topologies 2nd 3rd ring topologies 2nd 3rd routing topologies 2nd segmenting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th star topologies 2nd topologies 2nd VLANs 2nd LAN. [See also LAN] laying out 2nd 3rd 4th 5th LinkSys logical network design components 2nd 3rd 4th 5th 6th 7th 8th 9th maintaining physical networks planning 2nd 3rd 4th 5th 6th 7th Micorsoft monitoring 2nd multi-tiered topologies 2nd 3rd 4th multiple errors NETGEAR NetWarre printing objects 2nd 3rd 4th 5th OSI models 2nd 3rd 4th 5th 6th 7th 8th 9th 10th OSI Reference model TCP/IP 2nd 3rd 4th 5th 6th piconets 2nd ping command 2nd 3rd protocols 2nd adding stacks 2nd Linux/NetWare R-utilities authorization 2nd 3rd rcp 2nd 3rd rlogin 2nd 3rd 4th 5th 6th 7th 8th rsh 2nd 3rd 4th ruptime command 2nd rwho command 2nd RedHat reliability 2nd routers Cisco 2nd 3rd 4th configuring 2nd 3rd connections 2nd 3rd delegating LAN responsibilities 2nd 3rd hierarchical network organizations 2nd Internet 2nd managing LAN sizes 2nd 3rd 4th 5th NAT/packet filtering 2nd ports 2nd 3rd 4th protocols 2nd security 2nd selecting 2nd SAN SANs. [See also SANs] scatternets 2nd SCSI applying NAS and SANs 2nd Arbitrated Loops (SANs) 2nd 3rd 4th 5th 6th 7th 8th 9th capacity (NAS) 2nd 3rd 4th connections 2nd fabric switched topology (SANs) 2nd 3rd 4th 5th Fibre Channel (SANs) 2nd 3rd 4th IP (SANs) 2nd 3rd mixed topologies (SANs) 2nd 3rd 4th NAS 2nd network appliances (NAS) 2nd protocols (NAS) 2nd SANs 2nd 3rd 4th security 2nd 3rd access control mechanisms 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th auditing 2nd delegating authority 2nd 3rd 4th 5th disabling default options 2nd firewalls 2nd physical measures 2nd 3rd 4th 5th 6th 7th policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th policies and procedures services and system daemons 2nd segments routers 2nd 3rd 4th 5th switches 2nd 3rd simple repeaters Smaba.org sniffers 2nd SOHO 2nd backups 2nd requirements 2nd 3rd 4th 5th topologies 2nd 3rd 4th vertical-market applications 2nd 3rd 4th 5th 6th 7th 8th 9th 10th SOHO (Small Office and Home Office) troubleshooting speed selecting NICs 2nd switches 2nd 3rd chassis collapsed backbones 2nd 3rd 4th 5th cut-through switches 2nd 3rd full-duplex ethernet 2nd 3rd 4th hardware types 2nd 3rd 4th home offices 2nd Layer 3 switches 2nd managing results segmenting collison domains 2nd stackable store-and-forward switches 2nd troubleshooting testing BERT (Bit Rate Error Testers) 2nd cable testers 2nd cables 2nd 3rd handheld cable checkers impedance 2nd pulse width TDR (time domain reflectometer) 2nd 3rd velocity 2nd topologies troubleshooting traceroute command 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th traffic evaluating upgrades troubleshooting 2nd 3rd 4th auditing 2nd documentation 2nd 3rd 4th 5th maintenance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th problem resolution cycle 2nd 3rd 4th 5th 6th 7th 8th Unix. [See Unix] upgrading avoiding sidetracks 2nd closing deploying 2nd 3rd determining needs for 2nd 3rd 4th 5th 6th 7th documenting planning 2nd executing pilot programs 2nd maintaining support 2nd mapping 2nd 3rd measuring success 2nd planning 2nd restoring 2nd scheduling downtime setting goals surveying users 2nd 3rd testing 2nd 3rd 4th tracking training 2nd verifying corporate standards 2nd VLAN. [See VLAN] VPN (virtual private network). [See VPN] WAN routers 2nd WANs (wide area networks) back doors 2nd forged e-mail 2nd passwords 2nd preventing attacks 2nd 3rd Trojan horses 2nd viruses 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th wireless 2nd 3rd 4th ad-hoc 2nd 3rd 4th AMA APs (access points) 2nd 3rd 4th 5th connecting HomeRF technology IEEE IEEE 802.11 2nd IEEE 802.11;MAC layer 2nd 3rd 4th IEEE 802.11;Physical layer 2nd 3rd interference 2nd 3rd PAN 2nd 3rd public use of 2nd radio wave transmission security 2nd selecting 2nd spread-spectrum technology 2nd 3rd 4th WAN (wide area network) 2nd 3rd 4th Wi-Fi Alliance wireless adapters installing 2nd 3rd 4th 5th 6th 7th 8th new features eDirectory 2nd 3rd 4th New Local Group dialog box New Object-Group dialog box New Object-User dialog box New Printer Detection dialog box new technology determining needs for network upgrades 2nd new top-level domains 2nd New User dialog box 2nd NEXT (near-end cross-talk) NEXT (Near-End Cross-Talk) 2nd NEXT (near-end cross-talk) Next Node Identification (NID) NFS (Network File System) 2nd 3rd 4th 5th configuring daemons 2nd 3rd 4th 5th 6th 7th 8th 9th 10th procedures 2nd 3rd 4th RPC 2nd 3rd server-side daemons 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th troubleshooting 2nd 3rd 4th XDR 2nd nfsstat command nfsstat s commands NIC Asset/Power Management components autosensing 2nd base I/O ports 2nd 3rd connectors 2nd hardware bus types selecting 2nd 3rd 4th 5th 6th 7th 8th 9th information searching IRQ (Interrupt ReQuest Line) 2nd 3rd 4th load balancing 2nd multi- homed systems 2nd Remote Wake-Up component 2nd 3rd 4th 5th software drivers NDIS (Network Driver Interface Specification) 2nd ODI (Open Data-Link Interface) 2nd Packet Drivers 2nd troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th Linux configurations 2nd 3rd WfM (Wired for Management) 2nd Universal Network Boot WOL (Wake on LAN) 2nd Universal Network Boot WOL-compliant network cards 2nd NIC (network interface card) NIC (Network Interface Card) NID (Next Node Identification) NIS (Network Information Service) 2nd 3rd 4th clients domainname command 2nd maps 2nd 3rd 4th 5th modifying 2nd master/slave servers slaves 2nd 3rd starting 2nd 3rd yp commands 2nd ypserve daemon NIS (Network Information System) 2nd NIST (National Institute of Standards and Technology) NLM (NetWare Loadable Module) NLSP (NetWare Link Services Protocol) NMS (network management station) NNI (Network-Node Interface) nodes 5-4-3 rule 2nd hidden ring topologies noise testing nominial velocity of propogation non-authenticated commands 2nd non-maskable interrupts non-microsoft clients Samba 2nd 3rd nonbraodcast multiple access (NBMA) nonshared topologies 2nd 3rd nonvoliatile memory (NVRAM) NOOP command 2nd North American Digital Hierarchy Norton Internet Security 2003 NOS (network operating system) notification of delivery 2nd notifying users of network upgrades 2nd Novell connection-oriented services 2nd connectionless services 2nd directory structures 2nd Bindery 2nd Bindery Services 2nd 3rd 4th 5th comparing Bindery/NDS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th configuring NDS (NetWare Directory Service) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th NDS (NetWare Directory Service) 2nd 3rd 4th 5th 6th 7th 8th 9th IPX (Internetwork Packet Exchange) 2nd packets 2nd 3rd NCP independence 2nd 3rd 4th NCP (NetWare Core Protocol) 2nd packet signatures 2nd signature options 2nd 3rd 4th 5th 6th troubleshooting packet signatures 2nd protocols 2nd 3rd 4th 5th security AUDITCON/SYSCON utilites 2nd 3rd 4th 5th 6th Novell Advanced Audit Service (NAAS) Novell Core Protocol (NCP) Novell Directory Service Novell Directory Service (NDS) Novell Directory Service (NDS). [See also NetWare] Novell Directory Services (NDS) Novell Netware migrating to Windows NT 4.0/2000 2nd 3rd CSNW 2nd 3rd 4th GSNW 2nd 3rd 4th 5th 6th 7th SFN 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th NPRINTER.NLM 2nd nslookup command 2nd 3rd nslookup utility 2nd NSS (NetWare Name Service) NTBugTraq 2nd NTFS permissions Windows NT null packet numbers options ports filtering 2nd 3rd 4th numerical reply codes, FTP NVRAM (nonvoliatile memory) NVT (Network Virtual Terminal) 2nd NWADMN32 utility 2nd 3rd |