|
|
Index
A
- Addressing, see IP addressing
- Agent technology
- RMON 7-1
- Applets 6-2, 8-4
- ActiveX 8-4
- Java 8-4
- security 8-4
- Application gateways
- pros and cons 8-3
- Applications development
- client/server network applications 7-7
- Java 6-2, 8-4
- object-oriented applications development tools 7-7
- Architecture
- client/server 5-5, 6-3
- collapsed backbone 3-5
- Fibre Channel 2-4
- Object Management Architecture 6-4
- SNA 4-2
- wireless networks 2-6
- Asynchronous transfer mode, see ATM
- ATM
- ATM DXI (Dixie) 3-4
- clear channel 4-5
- constant bit rate traffic 4-6
- frame relay and 3-4, 4-2
- interLAN connectivity 4-4
- Inverse multiplexing 4-5
- LAN emulation 4-4
- protocol structures 4-7
- routing hubs 2-3
- service classes 4-6
- switched internetworks, migration to 7-2
- switching 4-6
- traffic control 4-6
- variable bit rate traffic 4-6
- voice and video, using ATM to deliver 5-1
B
- Backbone networks
- ATM 1-4
- CDDI 1-4
- collapsed backbone networks 3-5
- Fast Ethernet 1-4
- Fibre Channel 2-4
- FDDI 1-4, 3-5
- FDDI-based campus backbone 3-5
- multicast backbone (Mbone) 2-1
- switches 3-6
- technologies for 2-3
- Bandwidth
- increasing requirements 2-3
- multimedia transfer requirements 1-4
- Bit transformation schemes
- 8B10B code 1-5
- 8B6T code 1-5
- 5B6B code 1-5
- 4B5B code 1-5
- Bridging
- remote source route bridging 3-3
- source route bridging 3-3
- source route transparent bridging 3-3
- spanning tree algorithm 3-3
- translational bridging 3-3
- transparent bridging 3-3
C
- Cable
- cable plant, supporting 7-5
- coaxial cable 1-3
- diagnostic equipment 1-3
- fiber-optic cable 1-3
- labeling 1-3
- management 1-3
- management software 1-3
- twisted pair-cable 1-3
- wiring systems for LANs 1-3
- Case studies
- client/server 6-5
- network security 8-1
- Channels
- Fibre Channel 2-4
- Classic IP 4-4
- Classless inter-domain routing (CIDR)
- address allocation and management 3-2
- address space utilization 3-2
- hierarchical routing fundamentals 3-2
- provider-level information 3-2
- renumbering 3-2
- subnetwork-level address information 3-2
- subscriber-level information 3-2
- Clear channel ATM inverse multiplexing 4-5
- Client/server
- advantages and disadvantages 6-3
- benchmarking existing traffic 6-5
- business processes 6-3
- business reengineering 6-3
- case study 6-5
- client 6-3
- computing styles 6-3
- cooperative processing 6-3
- data access and management 6-3
- data base connectivity middleware 6-3
- distributed computing environment 6-4
- domain name system 6-3
- end-user needs, establishing 6-5
- gateway products 6-3
- improving network performance 6-5
- mainframe-centric client/server 6-3
- middleware 6-3
- multimedia applications 6-5
- network-centric client/server 6-3
- network protocol support 6-3
- partitioning applications 6-3
- performance 6-3, 6-5
- protocols and messaging 6-3
- remote office communication 6-5
- scalability 6-3
- server 6-3
- server consolidation 6-5
- simulating client/server performance 6-5
- systems architecture phase 6-3
- three-tiered model 6-3
- transaction managers 6-3
- Windows deployment 6-5
- X.500 global directory service 6-3
- Client/server simulation model 6-5
- Coaxial cable
- hybrid fiber/coaxial cable systems 1-3
- wiring systems for LANs 1-3
- Conformance testing
- generic cell rate algorithm 4-6
- Congestion control
- ABR services in ATM networks 4-7
- backward explicit congestion notification (BECN) 4-7
- explicit rate control algorithm (ERCA) 4-7
- forward explicit congestion notification (FECN) 4-7
- proportional rate control algorithm (PRCA) 4-7
- traffic control in ATM networks 4-6, 4-7
- Connection technologies
- Fibre Channel 2-4
- Connectivity
- Fibre Channel 2-4
- CORBA
- heterogeneous data base systems, integrating with CORBA 6-6
- interface definition language 6-6
- Java bridges to 6-2
- object model 6-6
- object request broker 6-6
- vendor support for 6-4
- Version 1.0 6-4
- Version 2.0 6-4
- Costs
- digital signaling 1-5
- Internet connection 4-3
- Java, applications development 6-2
- LAN downtime costs 1-6
- LAN interconnectivity 4-4
D
- Data base
- interoperability 6-6
- Java, integrating with 6-2
- servers 6-6
- Data base management systems
- constraint heterogeneity 6-6
- interoperability 6-6, 7-5
- query processing heterogeneity 6-6, 7-5
- schema heterogeneity 6-6
- semantic heterogeneity 6-6
- transaction processing heterogeneity 6-6
- Data base servers
- client communications with 6-6
- Data link connections
- global addressing 3-4
- Desktop evolution 3-5
- Dialup environments
- Novell NetWare in 4-3
- Digital signaling
- bit transformation schemes 1-5
- clocking 1-5
- cost and complexity 1-5
- encoding formats 1-5
- error detection 1-5
- noise immunity 1-5
- signal interference 1-5
- signal spectrum 1-5
- Directory service
- distributed 6-4
- X.500 6-3
- Distributed computing environment
- basic distributed services 6-4
- cell administration 6-4
- cell boundaries, determining 6-4, 7-2
- cell file system 6-4
- cell overhead 6-4
- cell security 6-4
- client/server support 6-4
- data sharing services 6-4
- distributed directory service 6-4
- distributed time service 6-4
- process threads 6-4
- remote procedure call interface 6-4
- security service 6-4
- vendor support 6-4
- Distributed file system
- desktop support 6-4
- diskless workstations 6-4
E
- Electrical distribution
- AC distribution circuits 1-6
- classes of power quality defects 1-6
- fast events 1-6
- grounding-related issues 1-6
- low-frequency events 1-6
- normal mode and common mode 1-6
- safety ground 1-6
- Electronic equipment sensitivities
- electrical interference 1-6
- microcomputer sensitivities measured 1-6
- operating principles of digital devices 1-6
- switching power supply performance characteristics 1-6
- E-mail
- gateways 4-3
- Pretty Good Privacy 8-7
- privacy protocols 8-6
- remote control access 2-7
- remote node access 2-7
- server software for 5-5
- Encoding techniques
- bit transformation schemes 1-5
- digital signaling 1-5
- 8B6T code 1-5
- 8B1OB code 1-5
- 5B6B code 1-5
- 4B5B code 1-5
- MLT-3 1-5
- signal encoding formats 1-5
- Encryption
- Caesar cipher 8-7
- International Data Encryption Algorithm 8-7
- Pretty Good Privacy 8-7
- public key 8-7
- Enterprise network switching
- high-performance cell-based routing and switching 4-4
- multiple application-based classes of service 4-4
- Ethernet LANs
- cabling 1-3
- Fast Ethernet 1-2
- Gigabit Ethernet 2-5
- MAC layer protocols 3-3
- RMON MIB and Ethernet objects 7-1
- switching 3-6
F
- Fast Ethernet
- auto-negotiation 1-2
- full duplex/flow control 1-2
- gigabit Ethernet 1-2
- IEEE 802.3u 1-1
- media independent interface 1-2
- 100Base-FX 1-2
- 100Base-TX 1-2
- 100Base-T2 1-2
- 100Base-T4 1-2
- repeater connections 1-2
- topology rules 1-2
- Fault tolerance 1-6, 1-7
- Raid technology 1-7
- FDDI
- backbone networks 1-4
- cabling 1-3
- MAC layer protocol 3-3
- MLT-3 encoding 1-5
- Fibre Channel
- architecture 2-4
- channel networking 2-4
- chip coding 2-4
- layers 2-4
- scalability 2-4
- services 2-4
- Fiber distributed data interface, see FDDI
- File transfer
- E-mail gateways 5-5
- file transfer protocol 5-5
- Firewalls
- application gateways 8-3
- circuit-level gateways 8-3
- installing on the network 8-3
- Internet 8-1
- LAN security 8-8
- limitations 8-3
- management 8-3
- packet filtering gateways 8-3, 8-8
- network security 8-1, 8-3, 8-8
- protocols 8-3, 8-8
- specialized LAN gateways 8-3
- types 8-1
- Fractional T1 service 3-4
- Fragmentation 3-1
- Frame relay
- as SDLC replacement 4-2
- ATM and 3-4
- compression 3-4
- costs 4-2
- data link connections 3-4
- faster implementations 3-4
- fractional T1 service 3-4
- Internet access 4-4
- local exchange carriers 3-4
- long-distance carriers 3-4
- multicast frame relay 2-1, 3-4
- network management 4-2
- network to network internetworking 3-4, 4-2
- OSI Layer 2 and Layer 3 characteristics 3-4, 4-2
- private networks and alternative carriers 3-4
- public frame relay service offerings 3-4
- RFC 1490 standard 3-4, 4-2
- routing over 3-4, 4-2
- simulating a frame relay network 6-5
- SNA internetworking 3-4, 4-2
- standards for service and equipment 3-4
- switched cells 3-4
- switches 3-3, 4-2
- technology overview 4-2
- T1 3-4
- T3 service 3-4
- voice over 3-4
- Frame relay switches 3-3, 4-2
G
- Gateways
- CGI 5-5
- IPX/IP 4-3
- Gigabit Ethernet 2-5
- Global naming tree 7-3
- Graphical device management 7-2
H
- Help desk 7-5
- Heterogeneous data base systems
- client communications with the server 6-6
- CORBA approach to integrating 6-6
- semantic heterogeneity 6-6
- High-performance scalable LANs
- architecture 3-2
- LAN building blocks 3-2
- performance, estimating 3-2
- requirements 3-2
- structured wiring 3-2
- High-speed backbones
- ATM in the building riser 3-2
- collapsed super-backbone 3-2
- FDDI-based campus backbone 3-2
- higher bandwidth to the desktop 3-2
- one bridge per port on the floor 3-2
- High-speed LAN standards
- Fast Ethernet 3-1
- media access layer 3-2
- network management 3-2
- physical layer 3-2
- services to higher layers 3-2
- Hubs
- routing hubs and ATM 2-3
- switched 1-4
I
- IEEE 802 standards
- high-level data link control 1-1
- IEEE 802.1 1-1
- IEEE 802.3 1-1
- IEEE 802.3u 1-1
- IEEE 802.4 1-1
- IEEE 802.5 1-1
- IEEE 802.6 1-1
- IEEE 802.9 1-1
- IEEE 802.10 1-1
- IEEE 802.11 1-1
- IEEE 802.12 1-1
- IEEE 802.14 1-1
- interconnection of IEEE LANs 1-1
- LAN standards 1-1
- LAN working groups 1-1
- logical link control sublayer 1-1
- media access control 1-1
- Integrated services digital network, see ISDN
- InterLAN switching
- applications 4-4
- ATM attributes for 4-4
- ATM networking, evolution to 4-4
- ATM's role in local networks 4-4
- campus networking 4-4
- complexity of 4-4
- virtual LANs 4-4
- Internet
- application software 5-5
- common gateway interface 5-5
- connecting to 5-5
- costs 5-5
- dial-up 5-5
- E-mail 5-5
- file transfer 5-5
- firewalls 8-1, 8-3
- frame relay, access 4-2
- gateways 4-3
- host computer access 5-5
- LAN connection 5-5
- NetWare Gateways 4-3
- protocol 3-1, 3-2, 4-1
- security through firewall technology 8-8
- servers 5-5
- service providers 3-2
- subtree 7-3
- World Wide Web 6-1
- Internet protocol
- addressing 3-1, 3-2
- classic IP 4-4
- conventions 5-2
- IPv4 and IPv6 4-1
- packet format 3-1
- videoconferencing over IP networks 5-2
- Internetworks
- frame relay internetworking 4-2
- network to network internetworking 3-4
- SNA internetworking 3-4
- switched internetworks 7-2
- supporting 7-5
- Interoperability
- CORBA approach to data base integration 6-6
- object-oriented approach to data base interoperability 6-6
- Intranets
- constructing 5-4
- fat vs. thin clients 6-1
- Web browsers 6-1
- Web-to-host access 6-1
- client/server/Web connections 6-1
- networking considerations 1-4, 6-1
- Inverse multiplexing
- ATM 4-5
- cell based 4-5
- clear channel 4-5
- compatibility 4-5
- costs 4-5
- multimedia traffic 4-5
- IP addressing
- broadcast 2-1
- classless inter-domain routing (CIDR) 3-2
- global naming tree 7-3
- hierarchical routing fundamentals 3-2
- improvements, demands for 3-2
- Internet service providers and 3-2
- IPv6 4-1
- multicast 2-1
- name resolution 4-5
- nonunique addresses 3-2
- routing 3-2, 4-5, 4-6
- subnet addressing 3-2, 4-5
- IP multicast protocol
- class D addressing 2-1
- report delay timers 2-1
- reports that other members overhear 2-1
- IP routing 3-2, 4-5, 4-6
- IPv6
- addresses 4-1
- 6bone trials 4-1
- extension headers and options 4-1
- features 4-1
- header format 4-1
- ICMP 4-1
- IPv4 comparison 4-1
- migrating to 4-1
- quality of service (QOS) parameters 4-1
- security 4-1
- terminology 4-1
- IPX/IP Gateway 4-3
- ISDN 2-7
J
- Java
- applets 6-2, 8-4
- applications development 6-2
- data bases, integrating with Java 6-2
- development costs 6-2
- native applications 6-2
- non-programmers, development tools for 6-2
- operating systems, integration with 6-2
- program portability 6-2
- program support and maintenance 6-2
- security 6-2, 8-4
- SNA integration 6-2
- technical training 6-2
L
- LAN emulation
- classic IP and MPOA 4-4
- routing requirements 4-4
- LAN reliability
- assessing needs for 1-6
- downtime costs 1-6
- repair costs, assessing 1-6
- risk analysis 1-6
- single and multiple port bridges 5-4
- system valuation calculation 1-6
- time value 1-6
- LAN support department
- adapting to new systems 7-5
- budgets 7-5
- cable plant 7-5
- communications 7-5
- customers 7-5
- goals, defining 7-5
- guidelines 7-5
- help desk 7-5
- internetworks 7-5
- network management 7-5
- networks 7-5
- organization size 7-5
- platforms 7-5
- priorities 7-5
- processes 7-5
- research and development 7-5
- staffing and sourcing 7-5
- LANs
- collapsed backbone architecture 3-5
- dedicated 2-3
- emulation 4-4
- encoding techniques 1-5
- Fibre Channel 2-4
- frame relay internetworking 4-4
- interconnectivity 3-5, 4-4
- interLAN switching 4-1, 4-4
- Internet connections 4-4
- Internet security 8-8
- multicast 2-1, 4-1
- multilayer IP/IPX switching 2-2
- multimedia, adapting for 1-4
- multilayer teleconferencing 5-3
- radio-based LAN techniques 2-6
- reliability, assessing 1-6
- remote 2-7
- security 8-1, 8-2, 8-5, 8-8
- structured wiring systems 1-3
- switched LANs 4-4, 5-1, 7-2
- switches 1-4, 2-2, 3-6
- switching and routing, 2-2, 3-6
- video on the LAN 5-1
- virtual LANs 7-2
- voice-LAN integration 5-1
- wireless 2-6
- Logical link control 1-1
- Logical link control sublayer
- IEEE 802.2 1-1
M
- MAC layer protocols
- Ethernet MAC 1-2, 3-3
- FDDI MAC 3-3
- Token Ring MAC 3-3
- Mbone 2-1, 5-2
- Media access control layers 1-1, 1-2
- Media rotation schemes
- father-son rotation 7-4
- grandfather-father-son 7-4
- tower of Hanoi tape rotation 7-4
- Metropolitan area networks
- IEEE 802.6 1-1
- Middleware
- data base connectivity middleware 6-3
- distributed computing middleware 6-3
- Modems
- pooling 2-7
- Multicast applications
- dataconferencing 2-1, 5-3
- real-time distribution of multimedia information 2-1, 5-3
- videoconferencing 2-1, 5-2, 5-3
- Multicast backbone, see Mbone
- Multicast file transfer applications
- data base updates 2-1
- distributed publishing 2-1
- electronic software distribution 2-1
- kiosk applications 2-1
- subscription-based information delivery 2-1
- Multicast networking
- broadcast IP 2-1
- frame relay 2-1
- IP multicast protocol 2-1
- LANs 2-1
- multicast backbone (Mbone) 2-1
- n-way multicast 2-1
- one-way multicast 2-1
- routing protocols 2-1
- switched multimegabit data service 2-1
- two-way multicast 2-1
- Multicast routing protocols
- distance vector multicast routing protocol (DVMRP) 2-1
- multicast open shortest path first (MOSPF) 2-1
- protocol independent multicast 2-1
- Multilayer IP/IPX switching 2-2
- Multimedia
- client/server applications 6-5
- desktop videoconferencing 5-3
- digital video files in the LAN environment 5-3
- implementations 1-4
- inverse multiplexing 4-5
- multimedia-enabling a network 1-4
- performance support 1-4
- teleconferencing 5-3
- voice and video 5-1
- voice and video infrastructure requirements 1-4, 5-1
- wiring strategies 1-4, 5-1
- Multimedia wiring strategies
- backbone choices 1-4
- configuration LAN switches 1-4
- FDDI backbone networks 1-4
- Intranet considerations 1-4
- reserved bandwidth 1-4
- structured wiring schemes 1-4
- virtual networking 1-4
N
- NetWare
- gateways 4-3
- IPX/IP Gateway 4-3
- overview 4-3
- Network administration 2-3
- Network design
- Fibre Channel 2-4
- frame relay networks 4-2
- intranets 5-4
- Network management
- client/server network performance 6-5
- flexibility 2-3
- frame relay networks 4-2
- global naming tree 7-3
- heterogeneous environments 2-3
- LAN support department 7-5
- security 8-1, 8-8
- staged technology introduction 2-3
- switched internetworks 7-2
- switching 5-1
- Network management tools
- global naming tree 7-3
- Network security
- applets 8-4
- case study 8-1
- end-to-end encryption 8-1
- external security 8-1
- internal 8-1
- Internet firewalling 8-1, 8-8
- legal defense 8-1
- limited access 8-1
- passwords 8-1, 8-8
- policies 8-2
- Pretty Good Privacy 8-6, 8-7
- privacy enhanced mail 8-6
- RSA public key cipher 8-6
- secure hubs 8-1
- sniffing solutions 8-1
- switched LANs 8-1
- telephony 8-1
- viruses 8-1, 8-5
- Network security policies
- communications security programs, establishing 8-2
- components 8-2
- computer emergency response team 8-2
- enforcing and maintaining 8-2
- external connections 8-2
- legal issues 8-2
- management support 8-2
- remote network access controls 8-2
- writing 8-2
- Networks
- client/server network management 6-5
- client/server network simulation 6-5
- data and storage management techniques 7-4
- Ethernet 5-1
- Fast Ethernet 1-2
- fault-tolerant 1-6
- Fibre Channel 2-4
- firewalls 8-1, 8-3
- frame relay 3-4, 4-2
- frame relay network simulation 6-5
- Intranets 5-4
- multicast 2-1, 4-1
- multimedia 1-4
- security 8-1, 8-2, 8-5, 8-8
- switched internetworks 7-2
- trends 2-3
- video-ready networks 5-2
- virtual LANs 1-4, 2-3, 7-2
- virtual networking 1-4, 2-3, 7-2
- wireless 2-6
- wiring strategies 1-3
- Novell NetWare
- Inetix 4-3
- IntranetWare 4-3
- IPX/IP Gateway 4-3
- NetWare 4.1 4-3
O
- Object management
- global naming tree 7-3
- object groups 7-3
- object identifiers 7-3
- Object model 6-6
- Object-oriented technology
- object model 6-6
- object reference model 6-4, 6-6
- object request broker (ORB) 6-6
- Object reference model
- common facilities 6-4
- object request broker 6-4, 6-6
- object services 6-4
- Object request broker (ORB) 6-6
- 100Base-T
- full duplex/flow control 1-2
- 100Base-T2 1-2
- 100Base-X signaling systems
- 100Base-T4 1-2
- 100Base-FX 1-2
- 100Base-TX 1-2
- Open Systems Interconnection, see OSI
- Operating systems
- Java, integration with 6-2
- NetWare 4-3
- UNIX 5-5
- Windows NT 5-5
- OSI
- application layer 3-3
- Fibre Channel 2-4
- layer 2 and layer 3 combined 3-4
- link layer 3-3
- network layer 3-3
- physical layer 3-3
- presentation layer 3-3
- session layer 3-3
- transport layer 3-3
P
- Packet filtering gateways
- implementation 8-3, 8-8
- security policies for 8-3
- writing the packet filter description 8-3
- testing and revising packet filters 8-3
- Packet-switched networks
- frame relay implementation 4-2
- Point-to-point wireless networks
- infrared-based point-to-point techniques 2-6
- radio-wave point-to-point techniques 2-6
- Power distribution systems
- design for fault-tolerant networks 1-6
- Power quality improvement
- ferroresonant/constant voltage transformers 1-6
- filters 1-6
- power conditioning systems 1-6
- surge suppression 1-6
- tap changers 1-6
- transformer isolation 1-6
- uninterruptible power supplies 1-6
- voltage regulators 1-6
- Pretty Good Privacy (PGP)
- encryption 8-7
- E-mail risks 8-7
- E-mail security 8-7
- history 8-7
- key legitimacy 8-7
- public key certificates 8-6, 8-7
- public keys, getting 8-7
- signature trust 8-7
- Privacy enhanced mail (PEM)
- public key certificates, checking 8-6
- public key certificates, issuing 8-6
- revoking public keys 8-6
- Protocols
- frame relay 4-2
- IEEE 802.4 token passing bus protocol 1-1
- Internet protocol 1-4, 3-1, 4-1
- IPv4 4-1
- IPv6 4-1
- MAC layer 3-3
- Microsoft's 8-8
- models 3-1
- multicast 2-1
- Novell's 4-3, 8-8
- RMON 7-1
- SNMP 7-1, 8-3
- TCP/IP 3-1, 4-1, 5-4, 8-8
- transport protocols 3-1
- Public key certificates
- issuing 8-6
- Pretty Good Privacy public key certificates 8-6
- privacy enhanced mail public key certificates 8-6
- revoking 8-6
- validity, determining 8-6
Q
- Quality of service (QOS)
- videoconferencing requirements 5-2, 5-3
R
- Raid technology 1-7
- Remote LAN access
- ISDN 2-7
- modem pooling 2-7
- products 2-7
- remote control access 2-7
- remote node access 2-7
- security 2-7
- standard telephone line access 2-7
- Remote LAN applications
- E-mail 2-7
- field force automation 2-7
- Remote monitoring, see RMON
- Remote node 2-7
- Repeaters
- local 3-3
- multiport 3-3
- remote 3-3
- RFC 1271 7-1
- RFC 1490 standard
- DLSw versus 3-4
- RMON
- agent technology 7-1
- Ethernet objects 7-1
- future of RMON 7-1
- MIB 7-1
- RFC 1271 7-1
- RMON2 7-1
- token ring RMON MIB 7-1
- virtual LANs 7-1
- RMON2
- benefits 7-1
- new groups in 7-1
- World Wide Web and 7-1
- RMON MIB
- alarms 7-1
- filters 7-1
- history group 7-1
- host table 7-1
- host topN 7-1
- interoperability 7-1
- packet capture 7-1
- statistics group 7-1
- traffic matrix 7-1
- Routers
- frame relay, comparison with 4-2
- routing hubs 2-3
- subnets 3-2
- TCP/IP 3-1
- Routing
- cell-based 4-4
- classless inter-domain routing 4-4
- frame relay, routing over 4-2
- hierarchical routing 3-2
- IP routing 3-2
- LAN emulation routing requirements 4-4
- Novell NetWare routing issues 4-3
- routing hubs 2-3
- subnets 3-2
- TCP1P 3-1
- Routing hubs
- backbone connections 2-3
- dedicated LANs 2-3
- expanded internal throughput 2-3
- LAN types 2-3
- port switching 2-3
- routing 2-3
- segmentation 2-3
- virtual networks 2-3
- RSA algorithm
- defeating 8-7
- RSA public key ciphers
- digital signatures 8-6
S
- SDLC
- leased line replacement with frame relay 4-2
- Security
- audit logs and authentication 2-7
- convenience versus 8-1
- E-mail 8-7
- encryption 2-7, 8-1
- firewalls 8-1, 8-3, 8-8
- hubs 8-1
- internal 8-1
- Internet firewalling 8-1
- Java 6-2
- LANs 8-1, 8-8
- legal defense 8-1, 8-2
- network 8-1, 8-2, 8-8
- network security policies 8-2, 8-8
- passwords 8-1
- Pretty Good Privacy 8-6, 8-7
- privacy enhanced mail 8-6
- RSA public key cipher 8-6
- sniffing solutions 8-1
- switched LANs 8-1
- telephony 8-1
- viruses 8-1, 8-5
- World Wide Web standards 6-6
- Signal encoding formats
- biphase 1-5
- nonreturn to zero codes 1-5
- Simple network management protocol, see SNMP
- Simulation models
- client/server 6-5
- frame relay 6-5
- SNA
- frame relay network 4-2
- internetworking 3-4
- Java, integration with 6-2
- over frame relay 4-2
- SNMP
- frame relay and 4-2
- global naming tree 4-2
- RMON MIB 7-1
- Software
- cable management software 1-3
- CU-SeeMe software 5-2
- electronic software distribution 2-1
- middleware 6-3
- whiteboarding 5-3
- Spanning tree algorithm 3-3
- Staffing
- career paths 7-5
- junior staff 7-5
- management 7-5
- motivation 7-5
- salary 7-5
- senior staff 7-5
- specialists 7-5
- technical staff 7-5
- training 7-5
- Standards
- IEEE 802 1-1
- IEEE 802.1 higher-layer interface 1-1
- IEEE 802.2 logical link control 1-1
- IEEE 802.3 carrier-sense multiple access with collision detection 1-1
- IEEE 802.3u 100Base-T 1-1
- IEEE 802.4 token bus 1-1
- IEEE 802.5 token ring 1-1
- IEEE 802.6 metropolitan area network 1-1
- IEEE 802.7 broadband local area networks 1-1
- IEEE 802.8 optical fiber technology 1-1
- IEEE 802.9 integrated voice and data applications 1-1
- IEEE 802.9a iso-Ethernet 1-1
- IEEE 802.10 interoperable LAN security 1-1
- IEEE 802.11 wireless LANs 1-1
- IEEE 802.12 demand priority LAN 1-1
- IEEE 802.14 hybrid fiber coaxial systems 1-1
- RFC 1271 7-1
- RFC 1490 3-4
- T.120 5-3
- wiring standards 1-3
- Structured wiring 1-3, 1-5
- star topology 1-4
- switched hubs 1-4
- Subnets
- subnetwork-level address information 3-2
- Switch-based traffic
- managing 7-2
- Switched internetworks
- ATM, migrating to 7-2
- discovery protocol 7-2
- embedded network intelligence 7-2
- expansion, planning for 7-2
- graphical device management 7-2
- managing 7-2
- simulation tools 7-2
- switch-based traffic management 7-2
- VLAN management 7-2
- Switched multimegabit data service (SMDS)
- multicast SMDS 2-1
- Switches
- LAN 1-4, 2-2
- messaging 6-1
- midrange 5-1
- multilayer IP/IPX 2-2
- switched internetworks 7-2
- Switching
- cell-based 4-4
- enterprise network switching 4-4
- interLAN 4-4
- multilayer IP/IPX switching 2-2
- switched LANs 4-4
- Synchronous data link control, see SDLC
- System availability, ensuring
- auditing building AC distribution 1-6
- power conditioning to reduce system abends 1-6
- uninterruptible power systems 1-6
- Systems Network Architecture, see SNA
T
- TCP/IP
- DNS 3-1
- firewalls and 8-1, 8-8
- fragmentation and reassembly 3-1
- FTP 3-1
- history 3-1
- HTTP 3-1
- Internet protocol 3-1
- IP addressing 3-1
- IP packet format 3-1
- process and application protocols 3-1
- protocol models 3-1
- protocol suites 4-3
- remote file sharing 3-1
- routing 3-1
- security weaknesses 8-8
- SMTP 3-1
- Telnet 3-1
- transport protocols 3-1
- Teleconferencing
- audioconferencing 5-3
- multimedia 5-3
- voice and video 5-1
- Telephony
- security 8-1
- Telnet 3-1
- Testing
- frame relay devices 4-2
- packet filters 8-3
- Time-division multiplexing
- inverse multiplexing ATM 4-5
- Token ring LANs
- cabling 1-3
- IEEE 802.5 1-1
- MAC layer protocols 3-3
- RMON MIB 7-1
- Token ring RMON MIB
- ring station configuration control 7-1
- ring station control table 7-1
- ring station order 7-1
- ring station table 7-1
- source routing 7-1
- Transmission control protocol/Internet protocol, see TCP/IP
- Transport protocols
- TCP 3-1
- UDP 3-1
- Trends in networking
- bandwidth requirements increase 2-3
- powerful graphic applications 2-3 video and voice application support 2-3
U
- Uninterruptible power systems (UPS)
- backup power for extended runtime 1-6
- backup power for simple system shutdown 1-6
- battery maintenance 1-6
- inband through SNMP 1-6
- intelligent system interfaces 1-6
- inverter waveshapes 1-6
- out of bank through a modem 1-6
- transfer time 1-6
- Uninterruptible power systems architecture
- hybrid designs 1-6
- line interactive 1-6
- offline/standby 1-6
- online 1-6
- tri-port/isolated 1-6
V
- Video applications
- desktop videoconferencing 5-1, 5-2
- digital video 5-3
- multimedia training 5-3
- Video-ready networks
- bandwidth management protocols 5-2
- billing issues 5-2
- DVMRP 5-2
- end-point performance 5-2
- IPv5 5-2
- protocol independent multicasting 5-2
- RSVP 5-2
- upgrade and management 5-2
- Video technology
- bandwidth requirements 2-3
- business-to-customer applications 6-4
- compressing video streams 5-2
- desktop videoconferencing 5-1, 5-2, 5-3
- digital video 5-3
- hardware implementations 5-2
- infrastructure requirements 1-4, 5-1
- IP networks, operation in 5-2
- network interface hardware 5-2
- Videoconferencing
- bandwidth allocation 5-2
- CU-SeeMe software 5-2, 6-5
- desktop connections, establishing 5-1, 5-2
- desktop-enabling technologies 5-2
- IP-based 5-2
- IP network advantages and disadvantages 5-2
- IP networks, operation in 5-2
- modulating 5-2
- pros and cons of videoconferencing over IP networks 5-2
- QOS parameters 5-2
- Virtual LANs
- management 7-2
- multilayer switches 2-2
- overview 3-7, 5-2
- RMON and 7-1
- Virtual networking 1-4, 2-3, 5-2, 7-2
- Viruses 8-1, 8-2
- behavior blocking 8-5
- detecting 8-5
- eliminating 8-5
- generic detectors 8-5
- preventing 8-5
- signature scanning 8-5
- TSR monitoring 8-5
- Voice applications
- infrastructure requirements 1-4
- Voice communications
- applications 5-1
- ATM to deliver voice 5-1
- constant bit rate traffic control 4-6
- H.323 standard 5-1
- standards for delivering voice 5-1
- video and voice integration 5-1
W
- WANs
- frame relay 4-2
- wireless 2-6
- Wide area networks, see WANs
- Windows
- client/server, deployment in 6-5
- Wiring
- structured 1-3, 1-4
- Wireless networks
- architecture 2-6
- benefits 2-6
- diffused infrared-based LAN technique 2-6
- implementation issues 2-6
- LANs 2-6
- point-to-point infrared-based LAN technique 2-6
- power line technique 2-6
- IEEE 802.11 standard 1-1
- radio-based LAN techniques 2-6
- WANs 2-6
- Wireless WANs
- Ardis 2-6, 2-7
- AT&T wireless services 2-6
- RAM mobile data 2-6, 2-7
- Wireline networks
- challenges of 2-6
- Wiring systems for LANs
- access methods 1-3
- cable management 1-3
- cable management software 1-3
- diagnostic equipment 1-3
- FDDI 1-3
- improving 1-6
- isolated ground circuits 1-6
- LAN requirements 1-3
- LAN types 1-3
- multimedia wiring strategies 1-4
- network design 1-3
- network wiring components 1-3
- selecting 8-4
- star topology 1-4
- switched hubs 1-4
- topology 1-3
- transmission media 1-3
- World Wide Web
- applets 8-4
- clients 5-5
- HTML 5-5
- HTTP 5-5
- intranets and Webaccess 5-4
- protocols and specifications 6-6
- RMON2 and 7-1
- security standards 8-8
- servers 5-5
- software components 5-5
X
- X.500
- global directory service 6-3
|