Index: P
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: P
- Packet Capture Library (libpcap): 13.5.3. Capture filters
- packets: 1.3.1. Datagrams and packets
- 1.3.1. Datagrams and packets
- data link layer (7-layer model): 1.2.1. Frames and network interfaces
- envelopes: 1.2.1. Frames and network interfaces
- snoop and: 13.5.1. snoop
- see also datagrams: 1.3.1. Datagrams and packets
- .pag files: 3.3.5. Map files
- makedbm utility: 3.3.6. Map naming
- page cache: 16.5.3. Memory usage
- page mapping system, buffer cache: 7.3.2. Client I/O system
- parameters
- boot parameters
- confusion, case study: 15.3. Boot parameter confusion
- diskless clients: 8.3.4. Managing boot parameters
- clnt_idle_timeout: C. Tunable Parameters
- clnt_max_conns: C. Tunable Parameters
- mount
- retrans: 18.1.2. Timeout period calculation
- timeo mount: 18.1.2. Timeout period calculation
- nfs_max_threads: C. Tunable Parameters
- nfs3_max_transfer_size: C. Tunable Parameters
- nfs_nra: C. Tunable Parameters
- nfs_shrinkreaddir: C. Tunable Parameters
- nfs_write_error_to_cons_only: C. Tunable Parameters
- rsize: C. Tunable Parameters
- -t timeout: C. Tunable Parameters
- tunable: C. Tunable Parameters
- wsize: C. Tunable Parameters
- partitioned networks
- hardware: 17.2. Network partitioning hardware
- and NIS: 17.4.1. NIS in a partitioned network
- partitioning
- diskless clients and: 8.1. NFS support for diskless clients
- diskless nodes and: 17.4.2. Effects on diskless nodes
- low-bandwidth networks: 17.3. Network infrastructure
- NIS and: 17.4.1. NIS in a partitioned network
- NLM and: 11.2.2.3. Network partition
- passwd file, domains and: 4.4. Managing multiple domains
- passwd map, root entry: 3.2.2. Installing the NIS master server
- passwd.byname map: 3.3. Files managed under NIS
- 3.3.6. Map naming
- passwd.byuid map: 3.3.6. Map naming
- password files
- maps, generating: 3.3.6. Map naming
- netgroups map and: 3.3.2. Netgroups
- nicknames: 3.3.7. Map structure
- updates: 4.2.4. Password file updates
- password hashes, system accounts: 3.2.2. Installing the NIS master server
- passwords
- local files: 3.3.1. Working with the maps
- NIS security and: 12.3. Password and NIS security
- root password: 12.3.1. Managing the root password with NIS
- PROM: 12.3.2. Making NIS more secure
- protecting: 12.3. Password and NIS security
- unknown entries: 12.3.3. Unknown password entries
- user updates: 4.2.4. Password file updates
- patchadd utility: 8.7.1. Dataless clients
- PathName field, NFS log record: 14.6. NFS server logging
- pathnames, NFS: 7.2.5. Pathnames and filehandles
- PC/NFS
- configuration: 10.3. Configuring PC/NFS
- current use: 10.1. PC/NFS today
- file permissions: 10.4.2. Checking file permissions
- implementation features: 10.1. PC/NFS today
- limitations of: 10.2. Limitations of PC/NFS
- mounting filesystems: 10.4.1. Mounting filesystems
- overview: 10. PC/NFS Clients
- printing: 10.5. Printer services
- reasons to use: 10.2.2. Why PC/NFS?
- Samba and: 10.2.1. NFS versus SMB (CIFS)
- usage issues: 10.4. Common PC/NFS usage issues
- Windows Network Neighborhood integration: 10.4.1. Mounting filesystems
- pcnfsd: 10.5. Printer services
- performance
- benchmarking: 16.3. Benchmarking
- I/O threads, asynchronous: 7.2. NFS protocol and implementation
- NFS, bottlenecks: 16.4. Identifying NFS performance bottlenecks
- security and: 12.5.5.4. Security and performance
- server compensation, slow: 18.1. Slow server compensation
- performance measuring: 16.2. Measuring performance
- performance tuning: 13. Network Diagnostic and Administrative Tools
- bottlenecks: 17. Network Performance Analysis
- client-side: 18. Client-Side Performance Tuning
- measuring efforts: 16.2. Measuring performance
- server-side: 16. Server-Side Performance Tuning
- servers: 16.5. Server tuning
- buffers: 16.5.3. Memory usage
- CPU loading: 16.5.1. CPU loading
- cross-mounting filesystem: 16.5.6. Cross-mounting filesystems
- kernel configuration: 16.5.5. Kernel configuration
- memory usage: 16.5.3. Memory usage
- multihomed: 16.5.7. Multihomed servers
- nfsd threads: 16.5.2. NFS server threads
- throughput: 16.5.4. Disk and filesystem throughput
- permanent entries, ARP table: 13.2.3. IP to MAC address mappings
- permission checking, user information: 0. Preface
- Permission Denied error message: 15.6. Asynchronous NFS error messages
- permissions
- mount points, incorrect (debugging case study): 15.5. Incorrect mount point permissions
- PC/NFS: 10.4.2. Checking file permissions
- revoking: 12.1.2. Enabling transparent access
- physical devices, index numbers (ifconfig): 13.2.1.1. Examining interfaces
- physical link layer (7-layer model): 1.2. Physical and data link layers
- physical network interface, netstat and: 17.1.1. Local network interface
- physical network segments, IP network numbers: 1.3.5. Virtual interfaces
- pinging
- connectivity and: 13.2.4. Using ping to check network connectivity
- testing network: 15. Debugging Network Problems
- platform architecture: 8.2. Setting up a diskless client
- POINTTOPOINT flag, ifconfig: 13.2.1.1. Examining interfaces
- policies, setting for different systems: 3.1. Masters, slaves, and clients
- pools, IPv6 addresses: 1.3.6.1. IP Version 6 address pools
- port monitoring, security and: 12.4.6. Port monitoring
- port number: 1.4.2. Port numbers
- portmap: 1.5.3. Internet and RPC server configuration
- portmapper
- RPC services and: 13.3.1.2. RPC portmapper — rpcbind
- versions: 13.3.1.3. RPC version numbers
- portmapper daemon: 1.5.3. Internet and RPC server configuration
- prefixes, Ethernet interface: 13.2.3. IP to MAC address mappings
- presentation layer (7-layer model): 1.5. The session and presentation layers
- Prestoserve: 16.5.4.2. Disk array caching and Prestoserve
- PrincipleName field, NFS log record: 14.6. NFS server logging
- printing, PC/NFS: 10.5. Printer services
- private keys
- keyserv daemon: 12.5.4.8. Establishing a session key
- NFS security: 12.5.4.6. Public and private keys
- procedure calls, NIS protocol: 3.3.9. The ypserv daemon
- procedures, RPC (NFS): 7.2.1. NFS RPC procedures
- see also RPC: 7.2.1. NFS RPC procedures
- processor architecture: 8.2. Setting up a diskless client
- program numbers, RPC services: 13.3.1.1. Identifying RPC services
- PROM password: 12.3.2. Making NIS more secure
- properties, replicas: 6.5.1. Properties of replicas
- protocol layer (7-layer model), broadcasts: 1.2.2. Ethernet addresses
- protocol stack: 1.1. Networking overview
- see also network stack: 1.1. Networking overview
- protocols
- ARP: 1.3.2. IP host addresses
- filtering: 17.5. Protocol filtering
- IP: 1.3. Network layer
- mounts: 6.1. Setting up NFS
- networking and: 1.1. Networking overview
- NFS, statelessness, design and: 7.2.2. Statelessness and crash recovery
- NIS
- procedure calls: 3.3.9. The ypserv daemon
- stateful: 1.4.1. TCP and UDP
- XDR: 1.5.2. External data representation
- PRUNE_TIMEOUT parameter, nfslogd daemon: 14.6.8. Other configuration parameters
- public key exchange: 12.5.2.3. Public key exchange
- public keys,
NFS security: 12.5.4.6. Public and private keys
- publickey map,
database sources and: 3.2.2. Installing the NIS master server
- published mapping: 13.2.3. IP to MAC address mappings
- PWDR: 4.2.4. Password file updates
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.