CNAP.BOOK Page 694 Monday, April 30, 2001 12:45 PM CNAP.BOOK Page 695 Monday, April 30, 2001 12:45 PM
Total Page:16
File Type:pdf, Size:1020Kb
CNAP.BOOK Page 694 Monday, April 30, 2001 12:45 PM CNAP.BOOK Page 695 Monday, April 30, 2001 12:45 PM I N D E X compatibility, 354 Symbols database structure, 351–352 DDNS, 353 _ (underscore character), in filenames, 375 domains, 351 forests, 351 multimaster replication, 353 Numerics replication, 353 security, 354 3DES, 450 servers, 353 5-4-3 rule, 140–141 trust relationships, 352 6bone, 590 Active Directory Users and Computers MMC 10BaseFL, 67 snap-in, 322 10BaseT active hubs, 58, 96, 214 5-4-3 rule, 140 active primary partition, 378 node capacity, 141 active topologies, 143 upgradability, 136 ring topology, 56 10Base2, 63–64, 132–133, 202 Token Ring, 68 10Base5, 62, 134–135 actual connection speed, 555 100BaseT, 65 adapters, 165 100BaseVG-AnyLAN, 66, 125–126 addgroup command (UNIX), 333 100BaseX, 137 addresses 802.3z specification, Gigabit Ethernet, 66 AppleTalk, 150 1000BaseT, 137–138 classes (IP), 232–239 logical, 93 translation, 182–185 A administration, server-based networks, 48 ADSL (Asymmetric DSL), 173–174 AARP (AppleTalk Address Resolution Protocol), 53 Advanced Peer-to-Peer Networking (APPN), 422 ABRs (area border routers), 301 Advanced Research Projects Agency network, 9, acceptable use policies, 458 267, 597 access control lists (ACLs), 312, 443–444, 464 AF_INET addressing, 248 Active Directory, 354 AF_UNIX, 248 access interfaces, ISDN, 172 affordability of Internet services, 592 access methods AFIS (Automated Fingerprint Identification CSMA/CD, 122–123 System), 458 demand priority, 125–126 after-hours connectivity, 478–479 token passing, 123–124 agents, SNMP, 88 access points, 207 AH (Authentication Header), 445, 518 accessibility of networks, 432 AI (artificial intelligence), 602 accessing User Manager for domains, 321 alerts, 558 account lockout, 499 algorithms, encryption, 448–449 acknowledgments, 245 amplifiers, 120 ACLs (access control lists), 312, 443–444, 464 amplitude, 110 acoustic couplers, 486 analog signaling, 80, 109 active detection, 461 amplifiers, 120 Active Directory, 50, 322, 350 comparing to digital, 111–112 CNAP.BOOK Page 696 Monday, April 30, 2001 12:45 PM 696 analog signaling multiplexing, 113–114 archive bits, 468 ANDing, 244–245 ARCnet (Attached Resource Computer Network), AnyLAN, demand priority, 125–126 68–69, 151–152 APIPA (Automatic Private IP Addressing), 239, 242 data transfer, 151 APIs (application programming interfaces), 362 packets, 153 Apple Macintosh, 401–402 RG-62 cabling, 204 AppleShareIP, 335 ARCnet Plus, 69 AppleTalk, 53, 68, 150 areas (OSPF), 301 addressing, 150 argon lasers, 209 data transfer, 151 arguments, text-based operating systems, 365–366 zones, 150, 401 ARP (Address Resolution Protocol), 255 AppleTalk Address Resolution Protocol (AARP), 53 ARPAnet (Advanced Research Projects Agency applets, 544 network), 9, 267, 597 appliances, user friendly, 593 artificial intelligence, 591 application programming interfaces (APIs), 362 Ask Jeeves, 282 application filtering, 462 assessing need for security, 432 application layer (OSI reference model), 88–89, management philosophy, 433 261, 274 threats, 434 Application Server mode (Microsoft Terminal external, 434 Services), 541–542 internal, 439–441 application servers, 42, 319 type of business, 432 application/process layer (DoD model), 97 type of data, 433 applications assigned permissions, Active Directory, 354 backward compatibility, 373 assigning boot managers, 372 IP addresses, IANA, 233 client/server, 310 permissions to individual accounts, 48 defragmenters, 373 asymmetric encryption, 451 file types, 367 asynchronous communication ports, 485 instant messaging, 291 asynchronous transmission, 115 multitasking, 381 ATM (Asynchronous Transfer Mode), 178 scripts, 332 Attached Resource Computer Network. See ARCnet shells, 363 attacks telephony, 292–293 brute force, 435 Trojan horses, 438 DDoS, 433 Web browsers, 278–279 DoS, 436 APPN (Advanced Peer-to-Peer Networking), 422 ICMP floods, 436 architecture Ping of Death, 437 AppleTalk, 68 smurf attacks, 437 ARCnet, 68–69 SYN attacks, 438 combined topologies, 60 impersonation, 435 comparing, 154 IP spoofing, 438 data bus, 196–197 nuke, 436 Ethernet, 62 social engineering, 435 10Base2, 63–64 attenuation, 56, 67, 96, 112, 120, 133 10Base5, 62 attributes, 341–342 UTP, 64–67 audio conferencing, 292 Token Ring, 67–68 auditing, 460–461 CNAP.BOOK Page 697 Monday, April 30, 2001 12:45 PM bridges 697 AUI (attachment unit interface), 96, 196 baselining performance, 553–554 authentication, 451 battery mode (UPSs), 466 in biometrics, 458 BDCs (backup domain controllers), 321 Kerberos, 453–455 beaconing, 143 MS-CHAP, 483 bearer channels (ISDN), 172 mutual authentication, 483 Bellman’s equation, 298 passwords, 443–444 Berkeley Sockets, 248 remote access, 482–483 Berners-Lee, Tim, 279 smart cards, 455–456 best practices, 554 VPNs, 521 bin (UNIX), 330 authorization, VPNs, 521 binary automatic address allocation, 239–242 bits, 77 autonomous systems, 219 characters, 78 axis, 200 converting to decimal, 79, 236 converting to digital signals, 80 Bindery, 50, 326–327 B Novell NDS, 349 binding order, 414 backbone, 61, 268 Biometrics, 455–457 10Base5, 134 authentication, 458 commercial backbone, development, 268 BISDN (Broadband ISDN), 179 nodes, 268 bits, 77, 232 segments, 61 archive bits, 468 vBNS, 268–269 subnet masks, 242–244 backbone area (OSPF), 301 synchronization, 115 backing up data, 469 black boxes, 462 backslashes (\), 370 bloatware, 532 backward compatibility, operating systems, 373. Blowfish encryption, 516, 520 See also upgradability BNC connectors, 63, 132, 211–212 bands, HPFS, 376 Bohr, Neils, 592 bandwidth, 121 bonding, 484 aggregation, 483 books, electronic publishing, 600–601 channels, 112 boot manager programs, 372 measuring, 553 booting, 361 multilink, 484 BOOTP (Boot Protocol) protocol, 43, 537–538 on demand, 177 bootstrap code, PXE cards, 538 Banyan VINES (Virtual Integrated Network bootstrap loader, 375 Service), 334 bottlenecks, 552 Banyan VINES StreetTalk, 356 boundary layers, 99 BAP (Bandwidth Allocation Protocol), 484 branch offices, 478 barrel connectors, 211 connecting with VPNs, 515 base 2 numbering system, 78 BRI (Basic Rate Interface), 172, 483 base 10 numbering system, 76 bridges, 214–215 base 16 numbering system, 77–78 looping, 103, 217 baseband transmission, 112–113 nonroutable protocols, 216 source route, 216 CNAP.BOOK Page 698 Monday, April 30, 2001 12:45 PM 698 broadband broadband caching, proxy servers, 185 BISDN, 179 calculating CATV, 179–180 host per address class, 237 midsplit broadband configuration, 113 subnet masks, 243–244 broadcast addresses, 216, 230 callback security, 490, 497 broadcast storms, 219 CallNotes voice mail, 489 brouters, 220 capabilities of the Internet, 273–274 browse lists, 41, 386 capacity planning, 121 browsers (Web), 278–279 capture command (NetWare), 329 brute force attacks, 435 captured data, displaying, 559 b-tree (binary tree) capturing the printer port, 319 directory scheme, 373 carrier sense mulitple access collision detect, 62, indexing algorithms, 377 122–123 budetary factors in hybrid network case sensitivity implementation, 410 of operating systems, 364 burstiness, 181 passwords, 570 bus topology, 55–56 UNIX, 331, 375 bypassing operating system passwords, 443 catalog records, 377 bytes, 77–79 categorizing networks by administrative method, 38–49 by architecture, 62–69 C by NOS, 49–51 by physical scope, 33 cable modems, 493–494 LANs, 34 cable testers, 569 MANs, 35–36 cabling WANs, 37–38 ARCnet, 152 by protocol, 52–54 bandwidth, 121 by topology, 54–61 BNC connectors, 132 CATV, 179–180 cheapernet, 64 CDDI (Copper Distributed Data Interface), 149 coaxial, 200–202 cells (ATM), 178 impedence, 201 cellular technologies, 181 thicknet, 62 centralized computing, 308 thin coax, 201–202 server-based networks, 47 crossover cables, 136 WANs, 37 fiber-optic, 206–207 channels, 112 length specifications, 133 IDSN, 172 patch panels, 212–213 SPIDs, 165 plenum-grade, 200 CHAP (Challenge Handshake Authentication RG specifications, 64, 202 Protocol), MS-CHAP, 483 RJ-62, 204 character-based operating systems, 363 shielding, 119 characteristics thinnet, 202 of analog signaling, 109 Token Ring, 144–145 of digital signaling, 110–111 twisted-pair, 136, 204–205 of hybrid networks, 409–411 Type A connectors, 145 UTP, 64–67 CNAP.BOOK Page 699 Monday, April 30, 2001 12:45 PM command-line utilities, ping 699 of LANs, 34 NetWare, 328–329 of peer-to-peer networks, 44 remote access, configuring, 495–496 of server-based networks, 47 security, 48–49 characters, 78 shares, 40 chat rooms, 291 thin clients, 532–533 cheapernet, 64 advantages, 534 checkpointing, 90 BOOTP, 537–538 child objects, 344–345 cost, 534 Children’s Online Privacy Protection Act, 595 desktop computers, 540 chipping, 210 DHCP, 537–538 CIDR (classless interdomain routing), 238–239 handheld PCs, 541 CIFS (Common Internet File System), 422 hardware, 538–541 ciphers, 448 ICA, 536 CIR (committed information rate), 175 Net PCs, 540 circuit boards Network Computers, 539 data bus, 196–197 RDP, 536 jumpers, 162 RFB, 537 UART chips, 164, 486 security, 535 circuit filtering, 462 software, 541–542, 544–545 circuit switched networks, 6–7, 170 TFTP, 537–538 comparing to packet-switched, 8 WBTs, 539 DDS, 174 XDMCP, 536 DSL, 172 UNIX, 333 ISDN, 171–172 clouds, 176 leased lines, 174 cluster servers, 43 PSTN, 171 clustering technologies, 471 switched 56, 175–176 clusters, 43, 371–373 T-carriers, 174–175 CMIP (Common Management Information Citrix, 536 Protocol), 567 Winframe/MetaFrame, 542 coax cable, 22, 200–202 Class A