Book Home

Networking CD BookshelfSearch this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: P

Packet Capture Library (libpcap): 13.5.3. Capture filters
packets: 1.3.1. Datagrams and packets
1.3.1. Datagrams and packets
data link layer (7-layer model): 1.2.1. Frames and network interfaces
envelopes: 1.2.1. Frames and network interfaces
snoop and: 13.5.1. snoop
see also datagrams: 1.3.1. Datagrams and packets
.pag files: 3.3.5. Map files
makedbm utility: 3.3.6. Map naming
page cache: 16.5.3. Memory usage
page mapping system, buffer cache: 7.3.2. Client I/O system
parameters
boot parameters
confusion, case study: 15.3. Boot parameter confusion
diskless clients: 8.3.4. Managing boot parameters
clnt_idle_timeout: C. Tunable Parameters
clnt_max_conns: C. Tunable Parameters
mount
retrans: 18.1.2. Timeout period calculation
timeo mount: 18.1.2. Timeout period calculation
nfs_max_threads: C. Tunable Parameters
nfs3_max_transfer_size: C. Tunable Parameters
nfs_nra: C. Tunable Parameters
nfs_shrinkreaddir: C. Tunable Parameters
nfs_write_error_to_cons_only: C. Tunable Parameters
rsize: C. Tunable Parameters
-t timeout: C. Tunable Parameters
tunable: C. Tunable Parameters
wsize: C. Tunable Parameters
partitioned networks
hardware: 17.2. Network partitioning hardware
and NIS: 17.4.1. NIS in a partitioned network
partitioning
diskless clients and: 8.1. NFS support for diskless clients
diskless nodes and: 17.4.2. Effects on diskless nodes
low-bandwidth networks: 17.3. Network infrastructure
NIS and: 17.4.1. NIS in a partitioned network
NLM and: 11.2.2.3. Network partition
passwd file, domains and: 4.4. Managing multiple domains
passwd map, root entry: 3.2.2. Installing the NIS master server
passwd.byname map: 3.3. Files managed under NIS
3.3.6. Map naming
passwd.byuid map: 3.3.6. Map naming
password files
maps, generating: 3.3.6. Map naming
netgroups map and: 3.3.2. Netgroups
nicknames: 3.3.7. Map structure
updates: 4.2.4. Password file updates
password hashes, system accounts: 3.2.2. Installing the NIS master server
passwords
local files: 3.3.1. Working with the maps
NIS security and: 12.3. Password and NIS security
root password: 12.3.1. Managing the root password with NIS
PROM: 12.3.2. Making NIS more secure
protecting: 12.3. Password and NIS security
unknown entries: 12.3.3. Unknown password entries
user updates: 4.2.4. Password file updates
patchadd utility: 8.7.1. Dataless clients
PathName field, NFS log record: 14.6. NFS server logging
pathnames, NFS: 7.2.5. Pathnames and filehandles
PC/NFS
configuration: 10.3. Configuring PC/NFS
current use: 10.1. PC/NFS today
file permissions: 10.4.2. Checking file permissions
implementation features: 10.1. PC/NFS today
limitations of: 10.2. Limitations of PC/NFS
mounting filesystems: 10.4.1. Mounting filesystems
overview: 10. PC/NFS Clients
printing: 10.5. Printer services
reasons to use: 10.2.2. Why PC/NFS?
Samba and: 10.2.1. NFS versus SMB (CIFS)
usage issues: 10.4. Common PC/NFS usage issues
Windows Network Neighborhood integration: 10.4.1. Mounting filesystems
pcnfsd: 10.5. Printer services
performance
benchmarking: 16.3. Benchmarking
I/O threads, asynchronous: 7.2. NFS protocol and implementation
NFS, bottlenecks: 16.4. Identifying NFS performance bottlenecks
security and: 12.5.5.4. Security and performance
server compensation, slow: 18.1. Slow server compensation
performance measuring: 16.2. Measuring performance
performance tuning: 13. Network Diagnostic and Administrative Tools
bottlenecks: 17. Network Performance Analysis
client-side: 18. Client-Side Performance Tuning
measuring efforts: 16.2. Measuring performance
server-side: 16. Server-Side Performance Tuning
servers: 16.5. Server tuning
buffers: 16.5.3. Memory usage
CPU loading: 16.5.1. CPU loading
cross-mounting filesystem: 16.5.6. Cross-mounting filesystems
kernel configuration: 16.5.5. Kernel configuration
memory usage: 16.5.3. Memory usage
multihomed: 16.5.7. Multihomed servers
nfsd threads: 16.5.2. NFS server threads
throughput: 16.5.4. Disk and filesystem throughput
permanent entries, ARP table: 13.2.3. IP to MAC address mappings
permission checking, user information: 0. Preface
Permission Denied error message: 15.6. Asynchronous NFS error messages
permissions
mount points, incorrect (debugging case study): 15.5. Incorrect mount point permissions
PC/NFS: 10.4.2. Checking file permissions
revoking: 12.1.2. Enabling transparent access
physical devices, index numbers (ifconfig): 13.2.1.1. Examining interfaces
physical link layer (7-layer model): 1.2. Physical and data link layers
physical network interface, netstat and: 17.1.1. Local network interface
physical network segments, IP network numbers: 1.3.5. Virtual interfaces
pinging
connectivity and: 13.2.4. Using ping to check network connectivity
testing network: 15. Debugging Network Problems
platform architecture: 8.2. Setting up a diskless client
POINTTOPOINT flag, ifconfig: 13.2.1.1. Examining interfaces
policies, setting for different systems: 3.1. Masters, slaves, and clients
pools, IPv6 addresses: 1.3.6.1. IP Version 6 address pools
port monitoring, security and: 12.4.6. Port monitoring
port number: 1.4.2. Port numbers
portmap: 1.5.3. Internet and RPC server configuration
portmapper
RPC services and: 13.3.1.2. RPC portmapper — rpcbind
versions: 13.3.1.3. RPC version numbers
portmapper daemon: 1.5.3. Internet and RPC server configuration
prefixes, Ethernet interface: 13.2.3. IP to MAC address mappings
presentation layer (7-layer model): 1.5. The session and presentation layers
Prestoserve: 16.5.4.2. Disk array caching and Prestoserve
PrincipleName field, NFS log record: 14.6. NFS server logging
printing, PC/NFS: 10.5. Printer services
private keys
keyserv daemon: 12.5.4.8. Establishing a session key
NFS security: 12.5.4.6. Public and private keys
procedure calls, NIS protocol: 3.3.9. The ypserv daemon
procedures, RPC (NFS): 7.2.1. NFS RPC procedures
see also RPC: 7.2.1. NFS RPC procedures
processor architecture: 8.2. Setting up a diskless client
program numbers, RPC services: 13.3.1.1. Identifying RPC services
PROM password: 12.3.2. Making NIS more secure
properties, replicas: 6.5.1. Properties of replicas
protocol layer (7-layer model), broadcasts: 1.2.2. Ethernet addresses
protocol stack: 1.1. Networking overview
see also network stack: 1.1. Networking overview
protocols
ARP: 1.3.2. IP host addresses
filtering: 17.5. Protocol filtering
IP: 1.3. Network layer
mounts: 6.1. Setting up NFS
networking and: 1.1. Networking overview
NFS, statelessness, design and: 7.2.2. Statelessness and crash recovery
NIS
procedure calls: 3.3.9. The ypserv daemon
stateful: 1.4.1. TCP and UDP
XDR: 1.5.2. External data representation
PRUNE_TIMEOUT parameter, nfslogd daemon: 14.6.8. Other configuration parameters
public key exchange: 12.5.2.3. Public key exchange
public keys, NFS security: 12.5.4.6. Public and private keys
publickey map, database sources and: 3.2.2. Installing the NIS master server
published mapping: 13.2.3. IP to MAC address mappings
PWDR: 4.2.4. Password file updates


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z


Library Navigation Links

Copyright © 2002 O'Reilly & Associates, Inc. All Rights Reserved.