Brought to you by EarthWeb
IT Library Logo

Click Here!
Click Here!


Search the site:
 
EXPERT SEARCH -----
Programming Languages
Databases
Security
Web Services
Network Services
Middleware
Components
Operating Systems
User Interfaces
Groupware & Collaboration
Content Management
Productivity Applications
Hardware
Fun & Games

EarthWeb Direct EarthWeb Direct Fatbrain Auctions Support Source Answers

EarthWeb sites
Crossnodes
Datamation
Developer.com
DICE
EarthWeb.com
EarthWeb Direct
ERP Hub
Gamelan
GoCertify.com
HTMLGoodies
Intranet Journal
IT Knowledge
IT Library
JavaGoodies
JARS
JavaScripts.com
open source IT
RoadCoders
Y2K Info

Table of Contents


Index

A

Addressing, see IP addressing
Agent technology
RMON 7-1
Applets 6-2, 8-4
ActiveX 8-4
Java 8-4
security 8-4
Application gateways
pros and cons 8-3
Applications development
client/server network applications 7-7
Java 6-2, 8-4
object-oriented applications development tools 7-7
Architecture
client/server 5-5, 6-3
collapsed backbone 3-5
Fibre Channel 2-4
Object Management Architecture 6-4
SNA 4-2
wireless networks 2-6
Asynchronous transfer mode, see ATM
ATM
ATM DXI (“Dixie”) 3-4
clear channel 4-5
constant bit rate traffic 4-6
frame relay and 3-4, 4-2
interLAN connectivity 4-4
Inverse multiplexing 4-5
LAN emulation 4-4
protocol structures 4-7
routing hubs 2-3
service classes 4-6
switched internetworks, migration to 7-2
switching 4-6
traffic control 4-6
variable bit rate traffic 4-6
voice and video, using ATM to deliver 5-1

B

Backbone networks
ATM 1-4
CDDI 1-4
collapsed backbone networks 3-5
Fast Ethernet 1-4
Fibre Channel 2-4
FDDI 1-4, 3-5
FDDI-based campus backbone 3-5
multicast backbone (Mbone) 2-1
switches 3-6
technologies for 2-3
Bandwidth
increasing requirements 2-3
multimedia transfer requirements 1-4
Bit transformation schemes
8B10B code 1-5
8B6T code 1-5
5B6B code 1-5
4B5B code 1-5
Bridging
remote source route bridging 3-3
source route bridging 3-3
source route transparent bridging 3-3
spanning tree algorithm 3-3
translational bridging 3-3
transparent bridging 3-3

C

Cable
cable plant, supporting 7-5
coaxial cable 1-3
diagnostic equipment 1-3
fiber-optic cable 1-3
labeling 1-3
management 1-3
management software 1-3
twisted pair-cable 1-3
wiring systems for LANs 1-3
Case studies
client/server 6-5
network security 8-1
Channels
Fibre Channel 2-4
Classic IP 4-4
Classless inter-domain routing (CIDR)
address allocation and management 3-2
address space utilization 3-2
hierarchical routing fundamentals 3-2
provider-level information 3-2
renumbering 3-2
subnetwork-level address information 3-2
subscriber-level information 3-2
Clear channel ATM inverse multiplexing 4-5
Client/server
advantages and disadvantages 6-3
benchmarking existing traffic 6-5
business processes 6-3
business reengineering 6-3
case study 6-5
client 6-3
computing styles 6-3
cooperative processing 6-3
data access and management 6-3
data base connectivity middleware 6-3
distributed computing environment 6-4
domain name system 6-3
end-user needs, establishing 6-5
gateway products 6-3
improving network performance 6-5
mainframe-centric client/server 6-3
middleware 6-3
multimedia applications 6-5
network-centric client/server 6-3
network protocol support 6-3
partitioning applications 6-3
performance 6-3, 6-5
protocols and messaging 6-3
remote office communication 6-5
scalability 6-3
server 6-3
server consolidation 6-5
simulating client/server performance 6-5
systems architecture phase 6-3
three-tiered model 6-3
transaction managers 6-3
Windows deployment 6-5
X.500 global directory service 6-3
Client/server simulation model 6-5
Coaxial cable
hybrid fiber/coaxial cable systems 1-3
wiring systems for LANs 1-3
Conformance testing
generic cell rate algorithm 4-6
Congestion control
ABR services in ATM networks 4-7
backward explicit congestion notification (BECN) 4-7
explicit rate control algorithm (ERCA) 4-7
forward explicit congestion notification (FECN) 4-7
proportional rate control algorithm (PRCA) 4-7
traffic control in ATM networks 4-6, 4-7
Connection technologies
Fibre Channel 2-4
Connectivity
Fibre Channel 2-4
CORBA
heterogeneous data base systems, integrating with CORBA 6-6
interface definition language 6-6
Java bridges to 6-2
object model 6-6
object request broker 6-6
vendor support for 6-4
Version 1.0 6-4
Version 2.0 6-4
Costs
digital signaling 1-5
Internet connection 4-3
Java, applications development 6-2
LAN downtime costs 1-6
LAN interconnectivity 4-4

D

Data base
interoperability 6-6
Java, integrating with 6-2
servers 6-6
Data base management systems
constraint heterogeneity 6-6
interoperability 6-6, 7-5
query processing heterogeneity 6-6, 7-5
schema heterogeneity 6-6
semantic heterogeneity 6-6
transaction processing heterogeneity 6-6
Data base servers
client communications with 6-6
Data link connections
global addressing 3-4
Desktop evolution 3-5
Dialup environments
Novell NetWare in 4-3
Digital signaling
bit transformation schemes 1-5
clocking 1-5
cost and complexity 1-5
encoding formats 1-5
error detection 1-5
noise immunity 1-5
signal interference 1-5
signal spectrum 1-5
Directory service
distributed 6-4
X.500 6-3
Distributed computing environment
basic distributed services 6-4
cell administration 6-4
cell boundaries, determining 6-4, 7-2
cell file system 6-4
cell overhead 6-4
cell security 6-4
client/server support 6-4
data sharing services 6-4
distributed directory service 6-4
distributed time service 6-4
process threads 6-4
remote procedure call interface 6-4
security service 6-4
vendor support 6-4
Distributed file system
desktop support 6-4
diskless workstations 6-4

E

Electrical distribution
AC distribution circuits 1-6
classes of power quality defects 1-6
fast events 1-6
grounding-related issues 1-6
low-frequency events 1-6
normal mode and common mode 1-6
safety ground 1-6
Electronic equipment sensitivities
electrical interference 1-6
microcomputer sensitivities measured 1-6
operating principles of digital devices 1-6
switching power supply performance characteristics 1-6
E-mail
gateways 4-3
Pretty Good Privacy 8-7
privacy protocols 8-6
remote control access 2-7
remote node access 2-7
server software for 5-5
Encoding techniques
bit transformation schemes 1-5
digital signaling 1-5
8B6T code 1-5
8B1OB code 1-5
5B6B code 1-5
4B5B code 1-5
MLT-3 1-5
signal encoding formats 1-5
Encryption
Caesar cipher 8-7
International Data Encryption Algorithm 8-7
Pretty Good Privacy 8-7
public key 8-7
Enterprise network switching
high-performance cell-based routing and switching 4-4
multiple application-based classes of service 4-4
Ethernet LANs
cabling 1-3
Fast Ethernet 1-2
Gigabit Ethernet 2-5
MAC layer protocols 3-3
RMON MIB and Ethernet objects 7-1
switching 3-6

F

Fast Ethernet
auto-negotiation 1-2
full duplex/flow control 1-2
gigabit Ethernet 1-2
IEEE 802.3u 1-1
media independent interface 1-2
100Base-FX 1-2
100Base-TX 1-2
100Base-T2 1-2
100Base-T4 1-2
repeater connections 1-2
topology rules 1-2
Fault tolerance 1-6, 1-7
Raid technology 1-7
FDDI
backbone networks 1-4
cabling 1-3
MAC layer protocol 3-3
MLT-3 encoding 1-5
Fibre Channel
architecture 2-4
channel networking 2-4
chip coding 2-4
layers 2-4
scalability 2-4
services 2-4
Fiber distributed data interface, see FDDI
File transfer
E-mail gateways 5-5
file transfer protocol 5-5
Firewalls
application gateways 8-3
circuit-level gateways 8-3
installing on the network 8-3
Internet 8-1
LAN security 8-8
limitations 8-3
management 8-3
packet filtering gateways 8-3, 8-8
network security 8-1, 8-3, 8-8
protocols 8-3, 8-8
specialized LAN gateways 8-3
types 8-1
Fractional T1 service 3-4
Fragmentation 3-1
Frame relay
as SDLC replacement 4-2
ATM and 3-4
compression 3-4
costs 4-2
data link connections 3-4
faster implementations 3-4
fractional T1 service 3-4
Internet access 4-4
local exchange carriers 3-4
long-distance carriers 3-4
multicast frame relay 2-1, 3-4
network management 4-2
network to network internetworking 3-4, 4-2
OSI Layer 2 and Layer 3 characteristics 3-4, 4-2
private networks and alternative carriers 3-4
public frame relay service offerings 3-4
RFC 1490 standard 3-4, 4-2
routing over 3-4, 4-2
simulating a frame relay network 6-5
SNA internetworking 3-4, 4-2
standards for service and equipment 3-4
switched cells 3-4
switches 3-3, 4-2
technology overview 4-2
T1 3-4
T3 service 3-4
voice over 3-4
Frame relay switches 3-3, 4-2

G

Gateways
CGI 5-5
IPX/IP 4-3
Gigabit Ethernet 2-5
Global naming tree 7-3
Graphical device management 7-2

H

Help desk 7-5
Heterogeneous data base systems
client communications with the server 6-6
CORBA approach to integrating 6-6
semantic heterogeneity 6-6
High-performance scalable LANs
architecture 3-2
LAN building blocks 3-2
performance, estimating 3-2
requirements 3-2
structured wiring 3-2
High-speed backbones
ATM in the building riser 3-2
collapsed super-backbone 3-2
FDDI-based campus backbone 3-2
higher bandwidth to the desktop 3-2
one bridge per port on the floor 3-2
High-speed LAN standards
Fast Ethernet 3-1
media access layer 3-2
network management 3-2
physical layer 3-2
services to higher layers 3-2
Hubs
routing hubs and ATM 2-3
switched 1-4

I

IEEE 802 standards
high-level data link control 1-1
IEEE 802.1 1-1
IEEE 802.3 1-1
IEEE 802.3u 1-1
IEEE 802.4 1-1
IEEE 802.5 1-1
IEEE 802.6 1-1
IEEE 802.9 1-1
IEEE 802.10 1-1
IEEE 802.11 1-1
IEEE 802.12 1-1
IEEE 802.14 1-1
interconnection of IEEE LANs 1-1
LAN standards 1-1
LAN working groups 1-1
logical link control sublayer 1-1
media access control 1-1
Integrated services digital network, see ISDN
InterLAN switching
applications 4-4
ATM attributes for 4-4
ATM networking, evolution to 4-4
ATM's role in local networks 4-4
campus networking 4-4
complexity of 4-4
virtual LANs 4-4
Internet
application software 5-5
common gateway interface 5-5
connecting to 5-5
costs 5-5
dial-up 5-5
E-mail 5-5
file transfer 5-5
firewalls 8-1, 8-3
frame relay, access 4-2
gateways 4-3
host computer access 5-5
LAN connection 5-5
NetWare Gateways 4-3
protocol 3-1, 3-2, 4-1
security through firewall technology 8-8
servers 5-5
service providers 3-2
subtree 7-3
World Wide Web 6-1
Internet protocol
addressing 3-1, 3-2
classic IP 4-4
conventions 5-2
IPv4 and IPv6 4-1
packet format 3-1
videoconferencing over IP networks 5-2
Internetworks
frame relay internetworking 4-2
network to network internetworking 3-4
SNA internetworking 3-4
switched internetworks 7-2
supporting 7-5
Interoperability
CORBA approach to data base integration 6-6
object-oriented approach to data base interoperability 6-6
Intranets
constructing 5-4
fat vs. thin clients 6-1
Web browsers 6-1
Web-to-host access 6-1
client/server/Web connections 6-1
networking considerations 1-4, 6-1
Inverse multiplexing
ATM 4-5
cell based 4-5
clear channel 4-5
compatibility 4-5
costs 4-5
multimedia traffic 4-5
IP addressing
broadcast 2-1
classless inter-domain routing (CIDR) 3-2
global naming tree 7-3
hierarchical routing fundamentals 3-2
improvements, demands for 3-2
Internet service providers and 3-2
IPv6 4-1
multicast 2-1
name resolution 4-5
nonunique addresses 3-2
routing 3-2, 4-5, 4-6
subnet addressing 3-2, 4-5
IP multicast protocol
class D addressing 2-1
report delay timers 2-1
reports that other members overhear 2-1
IP routing 3-2, 4-5, 4-6
IPv6
addresses 4-1
6bone trials 4-1
extension headers and options 4-1
features 4-1
header format 4-1
ICMP 4-1
IPv4 comparison 4-1
migrating to 4-1
quality of service (QOS) parameters 4-1
security 4-1
terminology 4-1
IPX/IP Gateway 4-3
ISDN 2-7

J

Java
applets 6-2, 8-4
applications development 6-2
data bases, integrating with Java 6-2
development costs 6-2
native applications 6-2
non-programmers, development tools for 6-2
operating systems, integration with 6-2
program portability 6-2
program support and maintenance 6-2
security 6-2, 8-4
SNA integration 6-2
technical training 6-2

L

LAN emulation
classic IP and MPOA 4-4
routing requirements 4-4
LAN reliability
assessing needs for 1-6
downtime costs 1-6
repair costs, assessing 1-6
risk analysis 1-6
single and multiple port bridges 5-4
system valuation calculation 1-6
time value 1-6
LAN support department
adapting to new systems 7-5
budgets 7-5
cable plant 7-5
communications 7-5
customers 7-5
goals, defining 7-5
guidelines 7-5
help desk 7-5
internetworks 7-5
network management 7-5
networks 7-5
organization size 7-5
platforms 7-5
priorities 7-5
processes 7-5
research and development 7-5
staffing and sourcing 7-5
LANs
collapsed backbone architecture 3-5
dedicated 2-3
emulation 4-4
encoding techniques 1-5
Fibre Channel 2-4
frame relay internetworking 4-4
interconnectivity 3-5, 4-4
interLAN switching 4-1, 4-4
Internet connections 4-4
Internet security 8-8
multicast 2-1, 4-1
multilayer IP/IPX switching 2-2
multimedia, adapting for 1-4
multilayer teleconferencing 5-3
radio-based LAN techniques 2-6
reliability, assessing 1-6
remote 2-7
security 8-1, 8-2, 8-5, 8-8
structured wiring systems 1-3
switched LANs 4-4, 5-1, 7-2
switches 1-4, 2-2, 3-6
switching and routing, 2-2, 3-6
video on the LAN 5-1
virtual LANs 7-2
voice-LAN integration 5-1
wireless 2-6
Logical link control 1-1
Logical link control sublayer
IEEE 802.2 1-1

M

MAC layer protocols
Ethernet MAC 1-2, 3-3
FDDI MAC 3-3
Token Ring MAC 3-3
Mbone 2-1, 5-2
Media access control layers 1-1, 1-2
Media rotation schemes
father-son rotation 7-4
grandfather-father-son 7-4
tower of Hanoi tape rotation 7-4
Metropolitan area networks
IEEE 802.6 1-1
Middleware
data base connectivity middleware 6-3
distributed computing middleware 6-3
Modems
pooling 2-7
Multicast applications
dataconferencing 2-1, 5-3
real-time distribution of multimedia information 2-1, 5-3
videoconferencing 2-1, 5-2, 5-3
Multicast backbone, see Mbone
Multicast file transfer applications
data base updates 2-1
distributed publishing 2-1
electronic software distribution 2-1
kiosk applications 2-1
subscription-based information delivery 2-1
Multicast networking
broadcast IP 2-1
frame relay 2-1
IP multicast protocol 2-1
LANs 2-1
multicast backbone (Mbone) 2-1
n-way multicast 2-1
one-way multicast 2-1
routing protocols 2-1
switched multimegabit data service 2-1
two-way multicast 2-1
Multicast routing protocols
distance vector multicast routing protocol (DVMRP) 2-1
multicast open shortest path first (MOSPF) 2-1
protocol independent multicast 2-1
Multilayer IP/IPX switching 2-2
Multimedia
client/server applications 6-5
desktop videoconferencing 5-3
digital video files in the LAN environment 5-3
implementations 1-4
inverse multiplexing 4-5
multimedia-enabling a network 1-4
performance support 1-4
teleconferencing 5-3
voice and video 5-1
voice and video infrastructure requirements 1-4, 5-1
wiring strategies 1-4, 5-1
Multimedia wiring strategies
backbone choices 1-4
configuration LAN switches 1-4
FDDI backbone networks 1-4
Intranet considerations 1-4
reserved bandwidth 1-4
structured wiring schemes 1-4
virtual networking 1-4

N

NetWare
gateways 4-3
IPX/IP Gateway 4-3
overview 4-3
Network administration 2-3
Network design
Fibre Channel 2-4
frame relay networks 4-2
intranets 5-4
Network management
client/server network performance 6-5
flexibility 2-3
frame relay networks 4-2
global naming tree 7-3
heterogeneous environments 2-3
LAN support department 7-5
security 8-1, 8-8
staged technology introduction 2-3
switched internetworks 7-2
switching 5-1
Network management tools
global naming tree 7-3
Network security
applets 8-4
case study 8-1
end-to-end encryption 8-1
external security 8-1
internal 8-1
Internet firewalling 8-1, 8-8
legal defense 8-1
limited access 8-1
passwords 8-1, 8-8
policies 8-2
Pretty Good Privacy 8-6, 8-7
privacy enhanced mail 8-6
RSA public key cipher 8-6
secure hubs 8-1
sniffing solutions 8-1
switched LANs 8-1
telephony 8-1
viruses 8-1, 8-5
Network security policies
communications security programs, establishing 8-2
components 8-2
computer emergency response team 8-2
enforcing and maintaining 8-2
external connections 8-2
legal issues 8-2
management support 8-2
remote network access controls 8-2
writing 8-2
Networks
client/server network management 6-5
client/server network simulation 6-5
data and storage management techniques 7-4
Ethernet 5-1
Fast Ethernet 1-2
fault-tolerant 1-6
Fibre Channel 2-4
firewalls 8-1, 8-3
frame relay 3-4, 4-2
frame relay network simulation 6-5
Intranets 5-4
multicast 2-1, 4-1
multimedia 1-4
security 8-1, 8-2, 8-5, 8-8
switched internetworks 7-2
trends 2-3
video-ready networks 5-2
virtual LANs 1-4, 2-3, 7-2
virtual networking 1-4, 2-3, 7-2
wireless 2-6
wiring strategies 1-3
Novell NetWare
Inetix 4-3
IntranetWare 4-3
IPX/IP Gateway 4-3
NetWare 4.1 4-3

O

Object management
global naming tree 7-3
object groups 7-3
object identifiers 7-3
Object model 6-6
Object-oriented technology
object model 6-6
object reference model 6-4, 6-6
object request broker (ORB) 6-6
Object reference model
common facilities 6-4
object request broker 6-4, 6-6
object services 6-4
Object request broker (ORB) 6-6
100Base-T
full duplex/flow control 1-2
100Base-T2 1-2
100Base-X signaling systems
100Base-T4 1-2
100Base-FX 1-2
100Base-TX 1-2
Open Systems Interconnection, see OSI
Operating systems
Java, integration with 6-2
NetWare 4-3
UNIX 5-5
Windows NT 5-5
OSI
application layer 3-3
Fibre Channel 2-4
layer 2 and layer 3 combined 3-4
link layer 3-3
network layer 3-3
physical layer 3-3
presentation layer 3-3
session layer 3-3
transport layer 3-3

P

Packet filtering gateways
implementation 8-3, 8-8
security policies for 8-3
writing the packet filter description 8-3
testing and revising packet filters 8-3
Packet-switched networks
frame relay implementation 4-2
Point-to-point wireless networks
infrared-based point-to-point techniques 2-6
radio-wave point-to-point techniques 2-6
Power distribution systems
design for fault-tolerant networks 1-6
Power quality improvement
ferroresonant/constant voltage transformers 1-6
filters 1-6
power conditioning systems 1-6
surge suppression 1-6
tap changers 1-6
transformer isolation 1-6
uninterruptible power supplies 1-6
voltage regulators 1-6
Pretty Good Privacy (PGP)
encryption 8-7
E-mail risks 8-7
E-mail security 8-7
history 8-7
key legitimacy 8-7
public key certificates 8-6, 8-7
public keys, getting 8-7
signature trust 8-7
Privacy enhanced mail (PEM)
public key certificates, checking 8-6
public key certificates, issuing 8-6
revoking public keys 8-6
Protocols
frame relay 4-2
IEEE 802.4 token passing bus protocol 1-1
Internet protocol 1-4, 3-1, 4-1
IPv4 4-1
IPv6 4-1
MAC layer 3-3
Microsoft's 8-8
models 3-1
multicast 2-1
Novell's 4-3, 8-8
RMON 7-1
SNMP 7-1, 8-3
TCP/IP 3-1, 4-1, 5-4, 8-8
transport protocols 3-1
Public key certificates
issuing 8-6
Pretty Good Privacy public key certificates 8-6
privacy enhanced mail public key certificates 8-6
revoking 8-6
validity, determining 8-6

Q

Quality of service (QOS)
videoconferencing requirements 5-2, 5-3

R

Raid technology 1-7
Remote LAN access
ISDN 2-7
modem pooling 2-7
products 2-7
remote control access 2-7
remote node access 2-7
security 2-7
standard telephone line access 2-7
Remote LAN applications
E-mail 2-7
field force automation 2-7
Remote monitoring, see RMON
Remote node 2-7
Repeaters
local 3-3
multiport 3-3
remote 3-3
RFC 1271 7-1
RFC 1490 standard
DLSw versus 3-4
RMON
agent technology 7-1
Ethernet objects 7-1
future of RMON 7-1
MIB 7-1
RFC 1271 7-1
RMON2 7-1
token ring RMON MIB 7-1
virtual LANs 7-1
RMON2
benefits 7-1
new groups in 7-1
World Wide Web and 7-1
RMON MIB
alarms 7-1
filters 7-1
history group 7-1
host table 7-1
host topN 7-1
interoperability 7-1
packet capture 7-1
statistics group 7-1
traffic matrix 7-1
Routers
frame relay, comparison with 4-2
routing hubs 2-3
subnets 3-2
TCP/IP 3-1
Routing
cell-based 4-4
classless inter-domain routing 4-4
frame relay, routing over 4-2
hierarchical routing 3-2
IP routing 3-2
LAN emulation routing requirements 4-4
Novell NetWare routing issues 4-3
routing hubs 2-3
subnets 3-2
TCP1P 3-1
Routing hubs
backbone connections 2-3
dedicated LANs 2-3
expanded internal throughput 2-3
LAN types 2-3
port switching 2-3
routing 2-3
segmentation 2-3
virtual networks 2-3
RSA algorithm
defeating 8-7
RSA public key ciphers
digital signatures 8-6

S

SDLC
leased line replacement with frame relay 4-2
Security
audit logs and authentication 2-7
convenience versus 8-1
E-mail 8-7
encryption 2-7, 8-1
firewalls 8-1, 8-3, 8-8
hubs 8-1
internal 8-1
Internet firewalling 8-1
Java 6-2
LANs 8-1, 8-8
legal defense 8-1, 8-2
network 8-1, 8-2, 8-8
network security policies 8-2, 8-8
passwords 8-1
Pretty Good Privacy 8-6, 8-7
privacy enhanced mail 8-6
RSA public key cipher 8-6
sniffing solutions 8-1
switched LANs 8-1
telephony 8-1
viruses 8-1, 8-5
World Wide Web standards 6-6
Signal encoding formats
biphase 1-5
nonreturn to zero codes 1-5
Simple network management protocol, see SNMP
Simulation models
client/server 6-5
frame relay 6-5
SNA
frame relay network 4-2
internetworking 3-4
Java, integration with 6-2
over frame relay 4-2
SNMP
frame relay and 4-2
global naming tree 4-2
RMON MIB 7-1
Software
cable management software 1-3
CU-SeeMe software 5-2
electronic software distribution 2-1
middleware 6-3
whiteboarding 5-3
Spanning tree algorithm 3-3
Staffing
career paths 7-5
junior staff 7-5
management 7-5
motivation 7-5
salary 7-5
senior staff 7-5
specialists 7-5
technical staff 7-5
training 7-5
Standards
IEEE 802 1-1
IEEE 802.1 higher-layer interface 1-1
IEEE 802.2 logical link control 1-1
IEEE 802.3 carrier-sense multiple access with collision detection 1-1
IEEE 802.3u 100Base-T 1-1
IEEE 802.4 token bus 1-1
IEEE 802.5 token ring 1-1
IEEE 802.6 metropolitan area network 1-1
IEEE 802.7 broadband local area networks 1-1
IEEE 802.8 optical fiber technology 1-1
IEEE 802.9 integrated voice and data applications 1-1
IEEE 802.9a iso-Ethernet 1-1
IEEE 802.10 interoperable LAN security 1-1
IEEE 802.11 wireless LANs 1-1
IEEE 802.12 demand priority LAN 1-1
IEEE 802.14 hybrid fiber coaxial systems 1-1
RFC 1271 7-1
RFC 1490 3-4
T.120 5-3
wiring standards 1-3
Structured wiring 1-3, 1-5
star topology 1-4
switched hubs 1-4
Subnets
subnetwork-level address information 3-2
Switch-based traffic
managing 7-2
Switched internetworks
ATM, migrating to 7-2
discovery protocol 7-2
embedded network intelligence 7-2
expansion, planning for 7-2
graphical device management 7-2
managing 7-2
simulation tools 7-2
switch-based traffic management 7-2
VLAN management 7-2
Switched multimegabit data service (SMDS)
multicast SMDS 2-1
Switches
LAN 1-4, 2-2
messaging 6-1
midrange 5-1
multilayer IP/IPX 2-2
switched internetworks 7-2
Switching
cell-based 4-4
enterprise network switching 4-4
interLAN 4-4
multilayer IP/IPX switching 2-2
switched LANs 4-4
Synchronous data link control, see SDLC
System availability, ensuring
auditing building AC distribution 1-6
power conditioning to reduce system abends 1-6
uninterruptible power systems 1-6
Systems Network Architecture, see SNA

T

TCP/IP
DNS 3-1
firewalls and 8-1, 8-8
fragmentation and reassembly 3-1
FTP 3-1
history 3-1
HTTP 3-1
Internet protocol 3-1
IP addressing 3-1
IP packet format 3-1
process and application protocols 3-1
protocol models 3-1
protocol suites 4-3
remote file sharing 3-1
routing 3-1
security weaknesses 8-8
SMTP 3-1
Telnet 3-1
transport protocols 3-1
Teleconferencing
audioconferencing 5-3
multimedia 5-3
voice and video 5-1
Telephony
security 8-1
Telnet 3-1
Testing
frame relay devices 4-2
packet filters 8-3
Time-division multiplexing
inverse multiplexing ATM 4-5
Token ring LANs
cabling 1-3
IEEE 802.5 1-1
MAC layer protocols 3-3
RMON MIB 7-1
Token ring RMON MIB
ring station configuration control 7-1
ring station control table 7-1
ring station order 7-1
ring station table 7-1
source routing 7-1
Transmission control protocol/Internet protocol, see TCP/IP
Transport protocols
TCP 3-1
UDP 3-1
Trends in networking
bandwidth requirements increase 2-3
powerful graphic applications 2-3 video and voice application support 2-3

U

Uninterruptible power systems (UPS)
backup power for extended runtime 1-6
backup power for simple system shutdown 1-6
battery maintenance 1-6
inband through SNMP 1-6
intelligent system interfaces 1-6
inverter waveshapes 1-6
out of bank through a modem 1-6
transfer time 1-6
Uninterruptible power systems architecture
hybrid designs 1-6
line interactive 1-6
offline/standby 1-6
online 1-6
tri-port/isolated 1-6

V

Video applications
desktop videoconferencing 5-1, 5-2
digital video 5-3
multimedia training 5-3
Video-ready networks
bandwidth management protocols 5-2
billing issues 5-2
DVMRP 5-2
end-point performance 5-2
IPv5 5-2
protocol independent multicasting 5-2
RSVP 5-2
upgrade and management 5-2
Video technology
bandwidth requirements 2-3
business-to-customer applications 6-4
compressing video streams 5-2
desktop videoconferencing 5-1, 5-2, 5-3
digital video 5-3
hardware implementations 5-2
infrastructure requirements 1-4, 5-1
IP networks, operation in 5-2
network interface hardware 5-2
Videoconferencing
bandwidth allocation 5-2
CU-SeeMe software 5-2, 6-5
desktop connections, establishing 5-1, 5-2
desktop-enabling technologies 5-2
IP-based 5-2
IP network advantages and disadvantages 5-2
IP networks, operation in 5-2
modulating 5-2
pros and cons of videoconferencing over IP networks 5-2
QOS parameters 5-2
Virtual LANs
management 7-2
multilayer switches 2-2
overview 3-7, 5-2
RMON and 7-1
Virtual networking 1-4, 2-3, 5-2, 7-2
Viruses 8-1, 8-2
behavior blocking 8-5
detecting 8-5
eliminating 8-5
generic detectors 8-5
preventing 8-5
signature scanning 8-5
TSR monitoring 8-5
Voice applications
infrastructure requirements 1-4
Voice communications
applications 5-1
ATM to deliver voice 5-1
constant bit rate traffic control 4-6
H.323 standard 5-1
standards for delivering voice 5-1
video and voice integration 5-1

W

WANs
frame relay 4-2
wireless 2-6
Wide area networks, see WANs
Windows
client/server, deployment in 6-5
Wiring
structured 1-3, 1-4
Wireless networks
architecture 2-6
benefits 2-6
diffused infrared-based LAN technique 2-6
implementation issues 2-6
LANs 2-6
point-to-point infrared-based LAN technique 2-6
power line technique 2-6
IEEE 802.11 standard 1-1
radio-based LAN techniques 2-6
WANs 2-6
Wireless WANs
Ardis 2-6, 2-7
AT&T wireless services 2-6
RAM mobile data 2-6, 2-7
Wireline networks
challenges of 2-6
Wiring systems for LANs
access methods 1-3
cable management 1-3
cable management software 1-3
diagnostic equipment 1-3
FDDI 1-3
improving 1-6
isolated ground circuits 1-6
LAN requirements 1-3
LAN types 1-3
multimedia wiring strategies 1-4
network design 1-3
network wiring components 1-3
selecting 8-4
star topology 1-4
switched hubs 1-4
topology 1-3
transmission media 1-3
World Wide Web
applets 8-4
clients 5-5
HTML 5-5
HTTP 5-5
intranets and Webaccess 5-4
protocols and specifications 6-6
RMON2 and 7-1
security standards 8-8
servers 5-5
software components 5-5

X

X.500
global directory service 6-3


Table of Contents

footer nav
Use of this site is subject certain Terms & Conditions.
Copyright (c) 1996-1999 EarthWeb, Inc.. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of EarthWeb is prohibited. Please read our privacy policy for details.