Book Home

Networking CD BookshelfSearch this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: C

cabling
Ethernet: 1.2. Physical and data link layers
networks: 17.1.1. Local network interface
cache consistency checks: 7.4.1. File attribute caching
caching: 3.3.7. Map structure
7.4. Caching
attributes: 18.6. Attribute caching
benchmarking and: 16.3. Benchmarking
buffer cache: 7.3.2. Client I/O system
client data: 7.4.2. Client data caching
directory content (debugging case study): 15.4. Incorrect directory content caching
disk array: 16.5.4.2. Disk array caching and Prestoserve
DNLC: 7.4.3. Server-side caching
file attributes: 7.4.1. File attribute caching
file cache: 7.3.2. Client I/O system
inode cache: 7.4.3. Server-side caching
server-side: 7.4.3. Server-side caching
canonical form: 1.5.2. External data representation
byte ordering and: 1.5.2. External data representation
capture filters: 13.5.3. Capture filters
carrier sense, networks: 17.1.2. Collisions and network saturation
centralized management: 5.4. Centralized versus distributed management
chmod( ) system call, virtual filesystem and: 7.2. NFS protocol and implementation
chown( ) system call, vnode interface and: 7.1. Virtual filesystems and virtual nodes
CIFS (Common Internet File System): 10.2.1. NFS versus SMB (CIFS)
classes of network numbers: 1.3.3. IPv4 address classes
classless IP addressing: 1.3.4. Classless IP addressing
client binding, NIS tools: 13.4.2. Displaying and analyzing client bindings
client only NIS: 3.1. Masters, slaves, and clients
client-server model
presentation layer: 1.5.1. The client-server model
session layer and: 1.5.1. The client-server model
client-server NIS: 3.1. Masters, slaves, and clients
client-side failover: 6.5. Replication
client-side performance tuning: 18. Client-Side Performance Tuning
client-to-client relationships, trusted hosts and users: 12.1.1. Trusted hosts and trusted users
client-to-server relationships, trusted hosts and users: 12.1.1. Trusted hosts and trusted users
ClientName field, NFS log record: 14.6. NFS server logging
clients: 3.2.3. Installing NIS slave servers
data caching: 7.4.2. Client data caching
dataless: 8.7. Configuration options
diskless (see diskless clients)
DNS: 5.2.3. Run DNS on NIS clients and servers
filehandles and: 7.2.5. Pathnames and filehandles
hosts file, bypassing: 3.1. Masters, slaves, and clients
I/O system: 7.3.2. Client I/O system
lock recovery: 7.5.2. Client lock recovery
lookups: 3.3.9. The ypserv daemon
maps and: 3.1. Masters, slaves, and clients
names, AdminSuite: 8.2. Setting up a diskless client
network interface, bottlenecks: 16.4.1. Problem areas
NFS, troubleshooting: B.2. NFS client problems
NIS
client binding: 13.4.4. Setting initial client bindings
enabling: 3.2. Basics of NIS management
3.2.4. Enabling NIS on client hosts
NLM, crashes: 11.2.2.2. Client crash
rebotting after restore: 7.2.5. Pathnames and filehandles
servers as: 3.3.11. NIS server as an NIS client
shutdown, unmounting filesystems: 14.1. NFS administration tools
client/server distribution: 8.9. Client/server ratios
client/server rations, diskless clients: 8.9. Client/server ratios
clnt_idle_timeout parameter: C. Tunable Parameters
clnt_max_conns parameter: C. Tunable Parameters
close( ) system call, releasing data blocks: 7.2.4. Preserving Unix filesystem semantics
collision rate: 17.1.2. Collisions and network saturation
collisions: 17.1.2. Collisions and network saturation
input errors: 17.1.1. Local network interface
machine addition and: 17.1.2. Collisions and network saturation
network saturation and: 17.1.2. Collisions and network saturation
command-line, automounter master map: 9.2.2. Command-line options
commands
admhostadd: 8.2. Setting up a diskless client
cp: 3.3.5. Map files
domainname: 3.2.2. Installing the NIS master server
3.2.2. Installing the NIS master server
3.3.8. NIS domains
3.3.8. NIS domains
mount: 6.3.2. Using mount
Solaris: 6.3.3. Mount options
mount(1M): 6.3. Mounting filesystems
mv: 3.3.5. Map files
nfsstat: 6.5. Replication
rsh, remote execution: 12.1. User-oriented network security
share: 6.2. Exporting filesystems
exporting filesystems: 6.2.2. Exporting options
showmount: 14.1. NFS administration tools
solstice: 8.2. Setting up a diskless client
whoami: 12.3.3. Unknown password entries
ypmatch: 13.4.1. Key lookup
ypwhich: 13.4.2. Displaying and analyzing client bindings
compilers, data representation and: 1.5.2. External data representation
comp.protocols.nfs newsgroup, PC/NFS and: 10.1. PC/NFS today
computing environments: 0. Preface
configuration
bottlenecks and: 16.4.1. Problem areas
diskless: 8.8. Brief introduction to JumpStart administration
diskless clients: 8.7. Configuration options
information, NFS: 1. Networking Fundamentals
interface (ifconfig): 13.2.1. ifconfig: interface configuration
JumpStart: 8.8. Brief introduction to JumpStart administration
kernel, server performance tuning: 16.5.5. Kernel configuration
netinstall clients: 8.2. Setting up a diskless client
nfslogd daemon behavior: 14.6.8. Other configuration parameters
PC/NFS: 10.3. Configuring PC/NFS
10.3. Configuring PC/NFS
server logging: 14.6.3. NFS server logging configuration
servers, diskless clients: 8. Diskless Clients
configuration files
NIS: 0. Preface
copies: 3. Network Information Service Operation
database: 1. Networking Fundamentals
congested networks: 17.1. Network congestion and network interfaces
connected machines, IP addresses: 1.3.2. IP host addresses
connection-oriented services: 1.5.3. Internet and RPC server configuration
connectionless services: 1.5.3. Internet and RPC server configuration
connectivity, pinging and: 13.2.4. Using ping to check network connectivity
context switching, nfsd threads: 16.5.2.1. Context switching overhead
conventions used in book: 0.4. Conventions used in this book
copying maps: 3.3.5. Map files
cp command: 3.3.5. Map files
CPU loading
server: 16.4.1. Problem areas
server performance tuning: 16.5.1. CPU loading
utilities: 16.5.1. CPU loading
crashes, NFS protocol: 7.2.2. Statelessness and crash recovery
CRC checksums: 17.1.1. Local network interface
cron, viruses and: 12.6. Viruses
cross-mounting filesystems: 16.5.6. Cross-mounting filesystems
cryptography: 12.5.2. Brief introduction to cryptography
asymmetric key encryption: 12.5.2.2. Asymmetric key encryption
MAC: 12.5.2.4. One-way hash functions and MACs
one-way hash functions: 12.5.2.4. One-way hash functions and MACs
public key exchange: 12.5.2.3. Public key exchange
symmetric key encryption: 12.5.2.1. Symmetric key encryption
CYCLE_FREQUENCY parameter, nfslogd daemon: 14.6.8. Other configuration parameters
cycling logs: 14.6.6. NFS log cycling


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z


Library Navigation Links

Copyright © 2002 O'Reilly & Associates, Inc. All Rights Reserved.