Network Design and Management" - by Steven T.karris
Network Design and Management" - by Steven T.karris
Network Design and Management" - by Steven T.karris
Includes an
Introduction to
Simple Network
Management Protocol
(SNMP) and Remote
Monitoring (RMON)
Orchard Publications
www.orchardpublications.com
NETWORKS
Steven T. Karris is the founder and president of Orchard Publications. His undergraduate and graduate
degrees in electrical engineering are from Christian Brothers University, Memphis, Tennessee, and
Florida Institute of Technology, Melbourne, Florida. He is a registered professional engineer in California
and Florida. He has over 35 years of professional engineering experience in industry. In addition, he has
over 30 years of teaching experience that he acquired at several educational institutions as an adjunct
professor, the most recent with UC Berkeley, California.
Orchard Publications
Visit us on the Internet
www.orchardpublications.com
or email us: [email protected]
ISBN-13: 978-1-934404-15-7
ISBN-10: 1-934404-15-2
$74.95 U.S.A.
NETWORKS
Design and Management
Second Edition
Steven T. Karris
Orchard Publications
www.orchardpublications.com
ISBN 978-1-934404-15-7
Copyright: TX 5612942
Disclaimer
The author has made every effort to make this text as complete and accurate as possible, but no warranty is implied.
The information on hardware and software described was obtained from their respective companies through the
Internet. Accordingly, the information provided is on as is basis. The author and publisher shall have neither
liability nor responsibility to any person or entity with respect to any loss or damages arising from the information
contained in this text.
Preface
Networks are groups of computers that communicate by either cable or wireless transmissions. By
the use of computer networking, we can share data with others. Today, all businesses, small or
large use some type of computers and most use computer networking to handle their daily
business operations such as bookkeeping, inventory tracking, document storing, and e-mail.
Networks are growing in size and complexity and this trend has created a rapid increase for
networking engineers to provide practical and efficient solutions. Networking needs vary from one
network to another; there is no such thing as one size fits all. Also, a properly designed network
must allow for expansion. The management of a small company may feel that this advanced
technology is of no use to them since their monetary budget is limited. However, with proper
planning, small companies can start with an affordable and versatile network and later expand on
the next level of affordability.
This text is the second edition and presents updated networks material. The word design on
the title of this book implies the purchasing and installation of the essential hardware and
software that one must collect to assemble an effective computer network. Basically, it means the
building of a network. The word management is used to denote the duties and responsibilities of
a network administrator. Of course, one may argue that network management should include the
Simple Network Management Protocol (SNMP) and Remote Monitoring (RMON). While this is
true, a detailed treatment of those two topics are beyond the scope of this book. Chapters 8 and 9
are introductions to those two topics. SNMP and RMON are discussed in books that are devoted
just to these topics.
This book is primarily intended for those student and working professionals that have the desire to
become network administrators. However, all practicing engineers will find it to be a very valuable
source of information on this subject. It contains very interesting topics, and with the exception of
a simple example on Chapter 1, the material requires no mathematical operations.
The author makes no claim to originality of content or of treatment, but has taken care to present
concepts, definitions, and statements.
A few years ago, telephone networks and computer networks were considered two separate
entities. Nowadays, these two technologies are rapidly merging into one. For this reason, Chapter
1 begins with a discussion of the basic components of telephone and computer networks, and their
interaction. This chapter continues with the introduction of the centralized and distributive
processing networks, and outlines the differences among these networks. It concludes with a
discussion of Local Area Networks (LANs), Metropolitan Area Networks (MANs), and Wide
Area Networks (WANs).
Chapter 2 begins with a discussion on protocols to establish their relevance to the International
Standards Organization (OSI) Management Model. Protocols are covered in more detail on
Chapter 3. This chapter introduces several network devices and identify those that operate at
different layers of the OSI model. It concludes with a discussion of the IEEE 802 Standards.
Chapter 3 introduces several protocols including X.25, TCP/IP, IPX/SPX, NetBEUI, AppleTalk,
and DNA. In this chapter, we learn how these protocols combine to form a suite of protocols that
work at the various layers of the OSI model.
Chapter 4 presents the various physical network connections. It begins with the different physical
topologies, bus, star, ring, and mesh. Then, it introduces the network types including the
ARCNet, Ethernet, Token Ring, and Fiber Distributed Data Interface (FDDI). A discussion of
the wiring types and methods used in each of these network types is also included.
Chapter 5 begins with a discussion of the different buses, past and present. Network adapters are
discussed next. The chapter concludes with the introduction of the different components that
work together to provide source-to-destination data transmissions between devices on the same
network or different networks. Discussions on Bluetooth and Wi-Fi are also included.
Chapter 6 focuses on wired and wireless transmissions. No previous knowledge of data
communications is required for understanding the topics of this chapter.
Chapter 7 is devoted to discussions on the various types of networks that we can use for our needs,
the hardware and software required, and tasks that a network administrator must perform to
maintain the network(s) he is responsible for. These tasks include security and safeguarding data
from internal and external disasters.
Chapters 8 and 9 are introductions to SNMP and RMON respectively.
This text contains five appendices, A through E. Appendix A is a brief introduction to network
analysis as defined in operations research which is a branch of mathematics concerned with
financial and engineering economic problems. A simple and yet practical example is included.
Appendix B contains a review of the binary information representation, and the standard codes
used for information processing systems, communications systems, and associated equipment. It
provides the basic concepts to illustrate how networking devices work and communicate with
others. Appendix C is a review of the decimal, binary, octal, and hexadecimal numbers, their
representation, and conversion from one base to another. The conversion procedures are
illustrated with several examples. Appendix D is an introduction to RSA Encryption. Finally,
Appendix E is a glossary of terms and acronyms that are used in networks and on the Internet.
Like any other new book, this text may not be completely error-free; accordingly, all feedback for
errors and comments will be most welcomed and greatly appreciated. Please write us at Orchard
Publications www.orchardpublications.com, e-mail [email protected].
Table of Contents
1
Terminology............................................................................................................21
Protocols for Data Transmission ............................................................................22
Protocol Stacks .......................................................................................................23
2.3.1 Transmission Control Protocol/Internet Protocol (TCP/IP)........................23
2.3.2 File Transfer Protocol (FTP) ........................................................................23
2.3.3 Uniform Resource Locator (URL)................................................................24
2.3.4 Internet Protocol (IP) ...................................................................................24
2.3.5 Simple Mail Transfer Protocol (SMTP) .......................................................24
2.3.6 Transmission Control Protocol (TCP) ......................................................... 24
TOC-1
2.4
2.5
TOC-2
2.6
2.7
2.8
2.9
2.10
3.3
3.4
Definitions .............................................................................................................31
The X.25 Protocol .................................................................................................31
3.2.1 Synchronization ...........................................................................................33
3.2.2 Sequence of Operation ................................................................................34
3.2.3 Commands and Responses ...........................................................................34
3.2.4 Link Control................................................................................................. 35
3.2.5 Initiation of the Link ....................................................................................37
3.2.6 Information Transfer ....................................................................................37
3.2.7 Termination .................................................................................................38
3.28 Error Detection ............................................................................................38
3.2.9 Protocol Implementation .............................................................................38
Protocols Currently in Use ....................................................................................38
3.3.1 Routable Protocols .......................................................................................38
3.3.2 Nonroutable Protocols .................................................................................39
3.3.3 Connectionless Protocols .............................................................................39
3.3.4 Connection-Oriented Protocols ................................................................310
Most Commonly Used Protocol Suites ...............................................................310
3.4.1 TCP/IP Protocol Suite ...............................................................................311
TOC-3
TOC-4
5.2
5.3
5.4
5.5
5.6
5.7
TOC-5
6.4
6.5
6.6
6.7
6.8
6.9
6.10
6.11
6.12
TOC-6
TOC-7
8.12
8.13
8.14
8.15
8.16
8.17
8.18
8.19
9.4
9.5
9.6
9.7
TOC-8
9.8
9.9
9.10
9.11
9.12
9.13
RSA Encryption
D.1 How RSA Encryption Works ................................................................................ D1
D.2 An Example ........................................................................................................... D2
Glossary
Glossary of Computer/Internet Related Terms ...............................................................E1
TOC-9
Network
1-5
Multiple Choice
21. B Review Page 110
22. C Review Table 1.2, Page 114
23. D Review Page 110
24. A Review Page 115
25. D Review Page 115
1-27
1-28
hop to the metric to calculate the best route to the destination. Routers pass
routing tables to their nearest neighbors in all directions. At each exchange,
the router increments the distance value received for a route, thereby applying its own distance value to that route as shown in Figure 2.15.
1
First Hop
230
Request to Send
(ENQ)
No
(NAK)
Acknowledge
?
ACK Yes
Initialize Block No.
B=1
block and if everything goes well, the transmitter will send the
remaining blocks (total of ten for this example) and will check
to see if all blocks have been sent. Subsequently, the transmitter
will terminate the communication by sending an End of
Transmission signal (EOT).
Data Transmitted
No
NAK
Received
?
ACK Yes
B=B+1
B = 10
?
No
EOT
STOP
Figure 3.4. An oversimplified flow chart to show the initiation of binary transmission
35
Physical Topologies
Hub
The star architecture is more reliable network than the bus and it is easily expanded. With the
star, there is no central point of failure within the cable. If there is a problem with one cable that
connects a particular workstation to the hub, only that station is affected.
It may appear that a hub may become inoperative causing the entire star network architecture to
become inoperative also. This is highly unlikely because the hub is, in general, a passive device.
That is, hubs are very similar to patch panels where no power is required. However, some hubs are
active, and as such, require external power. Active hubs are employed in cases where it is necessary to regenerate weak signals so that they can be transmitted over greater distances. Hubs are
referred to as IEEE Class I and IEEE Class II repeaters. An IEEE Class I repeater is an active hub
and a Class II repeater is a passive hub.
* A hub is a device joining communication lines at a central location, providing a common connection to all devices on the network.
4-3
4-20
Network Types
Figure 4.14. 10/100 Mbps Ethernet USB Adapter (Courtesy Belkin International, Inc.)
Token Ring
MSAU
MSAU
MSAU
MSAU
While the arrangement of Figure 4.15 seems feasible since it each device is connected to the
MAU, inside the central device, the ports are connected in a ring. The ring configuration does
have one major weakness: there is a single point of failure. If there is a break in the ring, the entire
ring breaks down. To help overcome this deficiency, Token Ring hubs can detect a break in the
ring and disconnect that portion of the ring, allowing them to route the ring around the failed
area. Figure 4.16 shows a practical ring arrangement on a Token Ring network.
4-21
Workstation 2
Workstation 3
Segment 1
Workstation 4
Repeater 1
Workstation 5
Repeater 2
Segment 2
Segment 3
Repeater 3
Segment 4
Repeater 4
Workstation 6
Workstation 7
Segment 5
Repeaters are very inexpensive and provide an easy way to extend a network. However, any more
segments or repeaters that would violate the 543 rule, would cause timing problems and would
affect the collision detection used by the Ethernet.
5.3.2 Bridge
A bridge is device that connects and controls the flow of traffic between two LANs, or two segments of the same LAN. The two LANs being connected can be alike or dissimilar. For example,
a bridge can connect an Ethernet with a TokenRing network. Bridges are protocolindependent. They simply forward packets without analyzing and rerouting messages.
Bridges operate at the Data Link layer of the OSI model and, like a repeater, attach two different
network segments and pass data. The fundamental difference between a repeater and a bridge is
that a repeater allows all data to pass through, whereas a bridge checks the data and determines
whether they should be allowed to pass or not. For instance, if a network segment has a workstation and a server both on the same side of a bridge and these are exchanging information with
each other, the bridge senses this and does not allow passage of the data. Had this been a
repeater, the data would have been passed. Figure 5.8 shows two network segments interconnected with a bridge.
5-14
Wired Media
Table 6.1 lists the advantages and disadvantages of each type of cables that is discussed in this
chapter.
TABLE 6.1 Cable types and their advantages / disadvantages
Cable Type
Advantages
Disadvantages
UTP
Low cost
Easy installation
Capable of high speeds
High attenuation
Susceptible to EMI
Short distances (100 meter
limit) due to attenuation
STP
Medium cost
Easy installation
Faster than UTP and coaxial
Less susceptible to EMI than
UTP
Coaxial
Fiber Optic
Extremely fast
Very low or no attenuation
No EMI interference
Expensive installation
Highest cost
6.2.6 Multiplexing
Multiplexers are discussed in Chapter 5. Let us review the concept of multiplexing and also discuss frequency division multiplexing. We recall that multiplexing offers an efficient method of
using a single highbandwidth channel to transmit many lowerbandwidth channels. That is, we
can combine several lowbandwidth channels form a single highbandwidth channel for transmitting signals.
A Multiplexer/Demultiplexer (MUX/DEMUX) is the hardware device that allows the channels to
be joined for transmission over a single cable and to be separated at the receiving station. Both
broadband and baseband transmissions can benefit from this technique. A commonly known use
of this technique is cable TV. Many channels are sent across one cable. The channel changer on
the cable box is a demultiplexer that separates the signal. The multiplexing method used depends
on whether the transmission is broadband or baseband. These two types of multiplexing are Time
Division Multiplexing (TDM) and Frequency Division Multiplexing (FDM). In TDM all signals use
the same frequency but operate at different times, while in FDM, all signals operate at the same time
with different frequencies.
The concepts of TDM and FDM are illustrated in Figures 6.4 and 6.5 respectively.
NETWORKS - Design and Management, Second Edition
Copyright Orchard Publications
6-7
Chapter 7
Network Design and Administration
his chapter discusses the various types of networks that the networks administrator can use
to build for his/her needs, the hardware and software required, and tasks that a network
administrator must perform to maintain the network(s) he/she is responsible for. These
tasks include security and safeguarding data from internal and external disasters.
Expandability: The original network design must allow for a wide variety in expansion capabil-
Affordability: It is true that advanced technology is no good unless one can afford it. But he
can start with an affordable and versatile network and expand in the next level of affordability.
* Scalability means that newer and faster versions of LANs can be integrated into networks with older and slower hardware
devices while adding on new segments that run at higher data rates.
71
SNMP NMS
Object Instance
SNMP Agent
Figure 8.4. An MIB that counts all data passing through an router
In Figure 8.4, the data count obtained from each interface, shown by an arrow, is a managed
object instance, but the total count of data from all four interfaces is a managed object.
SNMP contains two standard MIBs. The first, MIB I, established in RFC 1156, was defined to
manage the TCP/IPbased internet. MIB II, defined in RFC 1213, is basically an update to MIB
I. MIBII refers to the current definition. SNMPv2 includes MIBII and adds some new objects.
There are MIB extensions for each set of related network entities that can be managed. For
example, there are MIB definitions specified in the form of Requests for Comments (RFCs) for
Domain Name System (DNS), Fiber DistributedData Interface (FDDI), and RS232C network
objects. Product developers can create and register new MIB extensions. Companies that have
created MIB extensions for their sets of products include Cisco, Fore, IBM, Novell, QMS, and
Onramp.
88
MAN
The NMS can be a Windowsbased or UNIXbased workstation or PC running a network management application that performs tasks as gathering statistics by monitoring packets of data on an
Ehernet segment, and storing information in accordance with the RMON specification. From the
NMS we can issue SNMP commands requesting information from the RMON agent. The RMON
agent sends the requested information to the NMS which then processes and displays this information on a console.
NIKSUN, www.niksun.com, has introduced the NetVCR Solution, a system that performs monitoring and analysis and supports critical RMON I and II groups. The RMON MIBs generated by
NetVCR allow network management systems to remotely access RMON data collected by NetVCRs recording interfaces. The user can set alarm thresholds on the NetVCR appliance.
The Bay Networks Implementation of RMON is shown in Figure 9.2. It consists of a BayStack
AN or BayStack ANH base module, the Data Collection Module (DCM), the Data Collection
Module MiddleWare (DCMMW), the DCM Flash memory module, and the RMON agent.
BayStack Module
DCM
DCMMW
RMON
Agent
DCM
Flash Memory
92
Index
Symbols and Numerics
<g> E-36
.NET Passport 7-23
10/100 stackable hub 7-6
1000BaseFX 4-19
100Base 4-18
100BaseFL E-1
100BaseFX 4-19
100BaseFX E-1
100BaseT E-1
100BaseT4 4-19
100BaseTX 4-18
100BaseTX Ethernet 7-6
10Base2 4-16
10Base2 E-1
10Base-2 Ethernet 2-22
10Base5 E-1
10BaseT 4-16
32 Bit E-1
3COM 3-21
3D Sound E-1
404 Error E-2
50-ohm RG-58 coax cable 6-4
50-ohm RG-7 or RG-11 coax cable 6-4
5-4-3 cabling rule 4-15
56K Line E-2
64 Bit E-2
64-bit Bus 5-2
64QAM 6-25
64-State Quadrature Amplitude
Modulation 6-25
802.1 E-2
802.10 2-37
802.10 E-2
802.11 E-2
802.11r 2-37
802.12 2-37
802.12 E-2
802.1d 2-36
802.2 2-36
802.2 E-2
802.3 2-36
802.3 E-2
802.3 u 2-36
802.3z 2-37
802.4 2-37
802.4 E-2
802.5 2-37
802.5 E-2
802.6 2-37
802.6 E-2
802.7 2-37
802.7 E-2
802.8 2-37
802.8 E-2
802.9 2-37
802.9 E-2
93-ohm RG-62 coax cable 6-4
A
a/s/l E-8
a1Host 9-15
a1Matrix 9-15
AARP E-3
Abend E-3
Abort E-3
Abstract Systems Notation One 8-12
Accelerated Graphics Port E-3
Acceptable User Policy E-3
Access Control 8-64
Access Control List E-3
Access Control Subsystem 8-68
Access Number E-3
Access Provider E-3
Access Speed E-3
Account Policy E-3
ACK B-3
ACK E-3
ACL E-3
Acoustic Coupler E-3
Active Channels E-3
active directory domain 7-20
Active Directory E-4
Active Downstream Neighbor 4-24
active hub 4-3, 5-20
Active Matrix Display E-4
Active Partition E-4
Active Server Pages E-4
Active Window E-4
active(1) 8-29
ActiveX E-4
Address Book E-4
address byte 3-5
Address Harvester E-4
Address Resolution E-4
Address Resolution Protocol
3-17, 4-10, E-4
Address Verification System E-4
Addressing 2-24
addressMap 9-15
ad-hoc mode 7-13
administrator account 7-23
ADN E-5
ADSL 30
ADSL E-5
Advanced Digital Network E-5
Advanced Interactive Executive E-5
Advanced Power Management E-5
Advanced Research Projects
Agency 3-11
Advanced Research Projects
Agency Network E-5
AdventNet 8-77
affordability 7-1
AFK E-5
Agent E-5
Agent SNMP v1, v2C, v3 8-77
AGP E-5
AI E-5
Aironet 340 Access Point 7-15
AIX E-5
alarm 9-13
alarm group 9-6
Algorithm E-5
Alias E-5
Aliasing E-5
Alpha Testing E-5
Alternate Mark Inversion (AMI) 6-23
Alternate Mark Inversion 5-30
AMD 5-3
American National Standards
Institute B-2, E-6
American Standard Code for Information
Interchange 2-13, B-2, E-6
American Wire Gauge 6-2
AMI 6-23
Amplitude E-6
amplitude modulation 6-21
amplitude shift keying 6-21
Analog E-6
Anchor E-6
Animated GIF E-6
Animation E-6
Annoyware E-6
anonymous FTP 3-18, E-6
Anonymous Login Convention E-6
ANSI B-2, E-6
Answer Files E-6
antenna 6-9, 6-10
Anti-aliasing E-6
API E-7
APM E-7
Apples LocalTalk network 2-10
Applet E-7
AppleTalk E-7
AppleTalk Address Resolution
Protocol E-7
IN-1
Backbone E-9
Backdoor E-9
Backup E-9
bad packets 9-10
badValue(3) 8-42
bandwidth 1-6, 8-26, E-10
Banner Ad E-10
Banyan VINES 3-33
base 10 C-3
base 16 C-2
base 8 C-2
baseband 2-21
Baseband System E-10
baseband transmissions 6-28
basic encoding rules 8-12
Basic Input Output System E-10
BAT E-10
Batch File E-10
Baud E-10
Baud Rate E-10
bbl E-10
BBS E-10
beaconing 4-25, E-10
BEL B-3
BER 8-12
best effort 4-9
Best Effort Attempt E-10
Beta Testing E-10
bfn E-10
BGI E-10
BGP 3-33
binary B-4, C-1, E-11
binary digits B-1
binary file B-1, E-11
Binary Gateway Interface E-11
Binary Hexadecimal E-11
binary messages B-1
Binary Number System E-11
binary phase shift keying 6-22
binary words B-1
Bindings E-11
Binhex E-11
BIOS 4-24
BIOS E-11
biphase-L or Manchester 6-22
biphase-Level 6-22
biphase-M 6-23
biphase-mark 6-23
Bit Depth E-11
Bit E-11
Bitmap E-11
BITNET E-11
BITS 8-28
bits B-1
Bits Per Second E-11
Black Point E-11
Blue Book recommendations 3-29
CAN B-4
Capacity Planning E-14
capture 9-13
carrier sense 4-8
Carrier Sense Multiple Access E-15
Carrier Sense Multiple Access with
Collision Avoidance 2-9, E-15
Carrier Sense Multiple Access with
Collision Detection 2-8, E-15
Cascade IRQ 2 5-7
Cascading Style Sheets E-15
Case-dependent E-15
Case-sensitive E-15
Castle Rock 8-12
Category 1 cable 4-18
Category 1 UTP 6-2
Category 2 cable 4-18
Category 3 cable 4-18
Category 4 cable 4-18
Category 5 cable 4-18, 7-8
Category 5 UTP 6-2
Category 6 cable 4-18
Cathode Ray Tube E-15
CATV E-15
CAU 4-22
C-band E-14
CCD E-15
CCITT 3-1
CDDI 7-10
CDFS E-15
CD-i E-15
CDMA 6-19
CD-R E-15
CD-ROM E-15
CD-RW E-15
cell 2-17
Central Office 3-26
Central Processing Unit E-15
Centralized Computing E-16
Centralized Networks E-16
centralized processing 1-10
Certificate Authority E-16
CGA E-16
CGI E-16
cgi-bin E-16
Chain Letter E-16
Channel capacity 1-6
Channel E-16
Channel Service Unit/Data
Service Unit 3-27
Charge-coupled Device E-16
Charset E-16
Chat E-16
Chat Room E-16
cheapernet 4-16
Checksum E-16
Chip E-16
Chipset E-16
Compiler E-20
Complete Trust Domain Model E-20
Compress E-20
Compression E-20
Compression Ratio E-20
Computer Aided Design E-20
Computer Aided Engineering E-20
Computer Browser Service E-20
computer clock B-1
Computer Conferencing E-20
Computer Name E-20
Computer Policy E-21
computer station 1-7
Computer Virus E-21
Computers E-20
concentrator 2-14
concentrator 4-4, E-21
Configuration E-21
configuration MIBs 8-25
confirmed class 8-65
conformance statements 8-66
Congestion E-21
connected network A-2
connection oriented 2-32
connection types 3-25
connectionless 2-28
connectionless protocols 3-9
Connection-Oriented Service E-21
Connector E-21
contention 2-24
Contention-Based Networking E-21
Control Access Unit 4-22
Control Panel E-21
converter 2-17
Cookie E-21
cooperative processing 1-11
coprime D-1
Coprocessor E-22
core switche 5-20
Cost Per Action E-22
Cost Per Click E-22
Cost Per Thousand E-22
counter 8-24
Counter32 8-27
Counter64 8-27
Country Code E-22
CPA E-22
CPC E-22
CPM E-22
CPS E-22
CPU E-22
CR B-3
Cracker E-22
Cramming E-22
Crash E-22
Crawler E-22
CRC 2-10
CRC E-22
IN-3
createAndGo(4) 8-29
createAndWait(5) 8-29
cross talk 6-2, E-22
Cross-platform E-22
CRS-1 router 5-23
CRT E-23
Cryptography E-23
CSMA E-23
CSMA/CA 2-9, 2-25, E-23
CSMA/CD 2-2, 2-8, 2-24, 2-25, E-23
CSNW E-23
CSS E-23
CSU/DSU 3-27
CTR E-23
cul E-23
Cursor E-23
cXML E-23
Cyberbunny E-23
Cyberpunk E-23
Cyberspace E-23
Cybersquatting E-24
Cyclic Redundancy Check
2-10, 5-8, E-24
Cylinder E-24
D
daemon 8-4
daisy-chain 3-31, 7-15
DAP 3-24
DAT E-24
Data 24
Data Circuit Equipment 3-2
data field 8-19
Data Link 3-2
Data Link Control 3-9, 3-24
Data Link Layer E-24
data migration 1-15
data packet 2-16
Data Projector E-24
Data Terminal Equipment 3-2
data types 8-19
Database E-24
database server 1-16
database services 1-16, E-24
datagram 2-19, 2-27, 3-15, E-24
Datagram Packet Switching E-25
Datagram Switching E-25
Data-Link Layer 2-23
DateAndTime 8-29
Daughterboard E-25
Daughtercard E-25
dB 1-6
DBMS 3-24
DC1 B-4
DC2 B-4
DC3 B-4
DC4 B-4
IN-4
DCE 3-2
DDS E-25
DDS-1 E-27
DDS-2 E-27
DDS-3 E-27
DDS-4 E-27
de facto 2-3
De Facto Standard Protocol E-25
De Jure Standard Protocol E-25
decibel 1-6
decimal C-1
Decompression E-25
decryption D-1
dedicated connections 3-25
dedicated leased lines 3-27
Dedicated Line E-25
Default Computer Policy E-25
Default Gateway E-25
Default User Policy E-25
Default User Profile E-26
Defined Object Identifiers 8-24
DEL B-4
Demand Paging E-26
demarc point 3-26
demilitarized zone 5-23
Demodulation E-26
Desktop Computer E-26
Desktop E-26
Desktop Operating System E-26
Desktop Publishing E-26
desktop switche 5-20
destroy(6) 8-29
deterministic 2-25
Deterministic Network E-26
Device Driver E-26
DHCP 3-19, 7-5, E-26
dHTML E-26
Dialog Box E-26
dial-up connections 3-27
Dial-Up Networking E-26
dibit 6-24
Differential Manchester 6-22
differential phase shift keying 6-24
differential quadrature phase
shift keying 6-25
Digerati E-27
Digital Access Protocol 3-24
Digital Data Storage E-27
Digital Signal Level 3-28
Digital Signal or Data Service
level 3-29
Digital Signature E-27
Digitizer E-27
DIP Switches E-27
direct memory access 5-6, E-27
direct sequence frequency
hopping 6-14
directed branch A-1
Directory E-27
Directory Name Service E-27
Directory Replication E-27
directory services 1-15, E-27
directory(1) subtree 8-10
Dish E-28
Disk Drive E-28
Disk Duplexing E-28
Disk E-28
Disk Mirroring E-28
Dispatcher 8-68
DisplayString 8-28
distance vector 2-30
Distance Vector Multicast
Routing Protocol 2-29
Distributed Computing E-28
Distributed Database Management
System 3-24
Distributed Databases E-28
Distributed Networks E-28
distributed processing 1-11
DIX Connector E-28
DLC 3-9, 3-24
DLE B-4
DMA 5-6, 5-9, E-28
DMH Software 8-77
DMZ 5-23
DNS 3-17, 7-21, E-28
document roadmap 8-62
domain 7-21, E-28
Domain Controller E-28
Domain Master Browser E-28
Domain Name System
3-17, 7-21, E-28
domain names 3-13, E-28
DOS E-29
Dot Matrix Printer E-29
Downlink E-29
Download E-29
Downtime E-29
dpi E-29
DPSK 6-22
DQPSK 6-25
draft standard protocols 8-2
Driver E-29
drop repeater 5-13
DS signals 3-29
DS-0 E-29
DS-1 E-29
DS-2 E-29
DS-3 E-29
DSL modem 5-29
DTE 3-2
DTP E-29
Dual Boot E-29
dual-attached FDDI topology 4-26
Dual-homed FDDI topology 4-26
Dump E-30
DUN E-30
DVMRP 2-29
Dvorak Keyboard E-30
Dynamic Host Configuration
Protocol 3-19, 7-5, E-30
Dynamic Hypertext Markup
Language E-30
dynamic routing 2-29, E-30
E
E- (prefix) E-30
Easter Egg E-31
EB E-31
EBCDIC 2-14, B-4
E-Commerce E-30
edge router 5-23
EDI E-31
EE-PROM E-31
EFT E-31
EGP 3-33
egp 8-31
egpNeighborLoss(5) 8-44
EIGRP 3-23
EISA 5-1, E-31
electromagnetic spectrum 6-25
Electron Gun E-31
Electronic Document Interchange E-31
Electronic Funds Transfer E-31
Electronically Erasable Programmable
Read Only Memory E-31
E-lecture E-30
EM B-4
E-mail E-31
EMF E-31
Emoticon E-31
Emulation E-31
encoding 6-20
Encoding E-32
encryption D-1
Encryption E-32
end office 1-2
End Systems E-32
End-User E-32
Enhanced Category 5 cable 4-18
Enhanced Interior Gateway Routing
Protocol 3-23
Enhanced Meta File E-32
ENQ B-3
enterprise 7-3
enterpriseSpecific(6) 8-44
EOT B-3
Error Checking E-32
Error Control E-32
Error Detecting and Correcting
Codes 2-13
error detection 3-8
errorIndication 8-75
ESC B-4
ETB B-4
Ethernet 3-23
Ethernet converter 5-26
Ethernet E-32
ethernet history group 9-6
ethernet statistics group 9-6
ETX B-3
event 9-14
event group 9-7
event viewer 1-13, 7-29, E-32
Exabyte E-32
executable B-4
Executable File E-32
expandability 7-1
Expanded Memory E-32
expanded MIB-II tree 9-11
experimental protocols 8-2
experimental(3) 8-10
explorer frame 5-18
Extended ASCII Character Set B-4
Extended Binary Code Decimal
Interchange Code 2-14, B-4
Extended Industry Standard
Architecture 5-1, E-32
Extended Partition E-32
External Gateway Protocol 3-33
External Viewer E-32
Extranet E-32
E-zine E-31
F
Facsimile Machine E-33
fallback 7-14
FAQ E-33
Fast Ethernet 4-18
FAT 7-24, E-33
Fault Correlator Tool 9-23
fault tolerance 1-10, E-33
FAX Machine E-33
FC-AL 3-32
FCS 3-8, 3-29
FDDI 3-11, 4-25, 7-10, E-33
FDM 6-7, 7-18
FDMA 6-18
FF B-3
Fiber Distributed Data Interface
Interface 4-25, E-33
fiber optic cable 6-5, 7-9, E-33
Fibre Channel-Arbitrated Loop 3-32
field 8-19, E-33
file 8-19
file allocation table 7-24, E-33
File Attributes E-33
File Compression E-33
File E-33
File Extension E-33
HDTV E-38
Headend E-39
Header E-39
hermaphroditic connector 4-23
Hertz E-39
Hex E-39
hexadecimal C-2, E-39
HFC 6-6
high performance file
system 7-25, E-39
High Performance Serial Bus 3-31
High-level Data Link
Control 2-20, 3-24
historic protocols 8-2
history 9-13
history control group 9-6
Hit E-39
Hive E-39
Home Page E-39
Home Phoneline Networking
Alliance 7-16
hop 2-19, E-39
Hop Count E-40
host 9-13, E-40
host group 9-6
hostTopN 9-13
hostTopN group 9-6
hot-swappable 7-4
HP E-40
HP OpenView 9-20
HPFS 7-25, E-40
HPNA 7-16\
HTML E-40
HTTP 3-18, E-40
hub 2-14, 4-13, 5-19, 7-4, E-40
hub repeater 5-13
Hybrid Fiber Coax 6-6
hybrid routing 2-31
Hyperlink E-40
Hypertext E-40
Hypertext Markup Language E-40
HyperText Transfer Protocol
3-18, E-40
Hz E-40
I
I/O 5-6, 5-7, E-40
I/O Address E-40
I/O Operations E-41
I/OOp E-41
IAB E-41
IANA 3-12
IANA E-41
IBM 8-78
IBM NetView 6000 9-20
ICANN 3-13
IPaddress 8-24
IPSec 7-33
IPv6 7-33
IPX 2-2, 3-20
IPX/SPX 2-31, 3-20
IRC E-44
IRQ 5-6, E-44
IRTF E-44
ISA 5-1, E-44
ISDN 2-20, 3-29, E-44
IS-IS 3-17
ISO 2-21
ISOC E-44
ISP E-44
J
Java E-44
Java Development Kit E-44
JavaScript E-45
JDK E-45
Joint Photographic Experts Group E-45
Joystick E-45
JPEG E-45
Jumper E-45
K
KB E-45
Kb E-45
Kermit 2-1, 2-10, E-45
Kernel E-45
Kernel Mode E-45
Key E-45
Keyboard, Video, and Mouse 7-7
keychange 8-71
Keyword E-45
Kilobit E-45
Kilobyte E-45
KVM switch 7-7
L
LAM 4-22
LAN 1-16, E-46
LANtastic 7-18
Laser Printer E-46
Laserdisc E-46
latency 5-20
LCD E-46
LDAP E-46
Leased-line E-46
lexicographic order 8-10
LF B-3
Light Pen E-46
Lightweight Directory Access
Protocol E-46
notify-view 8-72
notInService(2) 8-29
notReady(3) 8-29
notWritable(17) 8-43
NRZ-L 6-22
NRZ-M 6-22
NRZ-S 6-22
NSFnet 3-33
NT File System 7-24
NTFS 7-24, E-55
NTFS Permissions E-56
NTSC National Television Systems
Committee E-56
NUL B-3
number conversions C-3
NWLink 3-20
NWLink IPX/SPX Compatible
Transport E-56
O
object identifier 8-10, 8-24
object instance 8-7
Object Linking and Embedding E-56
Object-Oriented Programming E-56
OCR E-56
octal C-2
octet 3-13, B-1
octet string 8-24
ODBC E-56
ODI 3-21, 5-10
Offline E-56
offline operation 9-4
offline storage 1-15
OLE E-56
On-Board E-56
One-Way Trust E-56
Online E-57
Online Service E-57
online storage 1-15
on-off keying 6-21
OOK 6-21
Opaque 8-25
Open Datalink Interface 3-21, 5-10
Open Shortest Path First 3-17
Open Systems Interconnection Model
2-6, 2-20, E-57
Operating System E-57
operations research A-1
Optical Character Recognition E-57
Optical Disc E-57
Optical Storage E-57
Organizationally Unique Identifiers 4-9
oriented branch A-1
OS E-57
OSI Model 2-6, 2-20, E-57
OSPF 3-17
other(1) 8-29
otoh E-57
OUI 4-9
P
packet 2-16, E-57
Packet Assembler/Disassembler E-58
packet capture group 9-7
packet switching 2-18, 3-26, E-58
PAD E-58
Paging File E-58
PAL E-58
Palette E-58
Parallel Cable E-58
Parallel Port E-58
Parameter E-58
parity 2-6, E-58
Parsing E-58
Participative Design E-58
Partition E-59
passive hub 4-3, 5-20
password 7-24, E-59
Password Uniqueness E-59
Paste E-59
Path E-59
PBX E-59
PCI 5-3, E-59
PCMCIA 5-4, 7-3, E-59
PDA E-59
PDF E-59
peer 1-10
Peer E-59
peer-to-peer network 1-11, E-59
Peer-to-Peer Networking E-59
Pentium Pro 5-3
performance 7-29
performance logs and alerts 7-29
performance polling 8-7
peripheral E-59
Peripheral Component Interface E-59
PERL E-59
permanent(4) 8-29
Permissions E-59
Personal Computer Memory Card
International Association 5-4, E-60
Personal Digital Assistant E-60
phase modulation 6-21
phase shift keying 6-21
phoneline networking 7-16
PhysAddress 8-28
Physical Layer 2-22, E-60
Physical level in X.25 protocol 3-2
piggy-backing 7-15
ping 3-16, 8-26, E-60
Pixel E-60
PKUNZIP E-60
IN-9
PKZIP E-60
plain distributed processing 1-11
plug-and-play 2-17, 5-6, 7-4, E-60
Plug-in E-60
pmfjih E-60
PnP 5-6, 7-4
Point to Multipoint E-60
point-to-point infrared 6-27
Point to Point Multilink Protocol E-61
Point-to-Point Protocol 3-28, E-61
Point to Point Tunneling Protocol E-61
polling system 2-26, E-61
POP E-61
POP3 E-61
port 2-16, E-61
port number 2-16
Portable Document Format E-61
Portable Operating System Interface
for Computing Environments E-61
Portal E-62
POSIX E-62
Post Office Protocol E-62
Posting E-62
Potential Browser E-62
PPP 3-28, E-62
PPSN 3-2
PPTP E-62
Practical Extraction and Report
Language E-62
Preemptive Multitasking E-62
Presentation Layer 2-33, E-62
Primary Partition E-62
prime number D-1
Print Device E-62
Print Device Driver E-63
Print Job E-63
Print Monitor E-63
Print Processor E-63
Print Queue E-63
print server 1-15, E-63
print services 1-15, E-63
Printer Pool E-63
private branch exchange 1-3, E-63
private(4) 8-10
proactive monitoring 9-4
probeConfig 9-15
problem detection and reporting 9-4
Procedure E-63
proposed standard protocols 8-2
protocol 1-10, 2-1, 3-1, E-63
protocol filter tools 9-18
protocol operations 8-65
protocol stack 2-3, 3-21, E-63
protocol suite 3-10
protocolDir 9-15
protocolDist 9-15
protocols for data transmission 2-2
proxy forwarder 8-70
IN-10
RGB E-66
RI / RO modules 4-23
Rich Text Format E-66
RIF 5-19
Ring In / Ring Out Modules 4-23
ring topology 4-4, E-6
RIP 3-16, 3-22, E-66
RIPng 3-16
RIPv2 3-16
RISC E-66
RJ-11 E-66
RJ-45 E-66
RMON 8-2
RMON 9-1
RMON1 9-11
RMON1 Ethernet Groups 9-12
RMON1 Token Ring 9-14
RMON2 9-11, 9-15
ROFL E-66
ROM E-66
romlD 8-25
round trip time 4-12
Routable E-66
routable protocol 3-8
router 2-15, 5-21, 7-5, E-66
routing 2-29
Routing E-66
routing information field 5-19
Routing Information Protocol
3-16, 3-22, E-66
routing protocols 3-16
Roving RMON 9-17
RowPointer 8-29
RowStatus 8-29
RS B-4
RS-232C cable 7-5
RS-449 cable 7-5
RSVP 7-30
RTF E-66
rtfm E-66
RZ 6-22
S
SAINT 7-25
Sampling E-67
SAN 7-7
SAP 3-22
SARM in X.25 protocol 3-7
SATAN 7-25
satellite microwave 6-26
scalability 4-7
scalar object 8-26
Scanner E-67
S-CDMA 6-20
Schema E-67
scrambling 7-12
usrHistory 9-15
UTP 7-8
UTP E-77
UUCP E-77
UUENCODE E-77
V
VACM 8-71
vacmAccessTable 8-74
vacmContextTable 8-74
vacmSecurityToGroupTable 8-74
vacmViewTreeFamilyTable 8-75
Value E-77
Value Added Data 9-4
vampire tap 4-14
VarBind 8-36
variable binding 8-36
VariablePointer 8-29
VDSL 5-30
VDT E-77
VDU E-77
Verbose Mode E-77
Veronica E-78
versatility 7-1
Vertical Redundancy Checking 2-6
very-high frequency 6-9
VESA 5-2, E-78
vestigial side band 6-25
VHF 6-9
Video Compression E-78
Video Conferencing E-78
Video Display Terminal E-78
Video Display Unit E-78
Video Electronics Standard
Architecture 5-2, 5-3, 5-4
Video Electronic Standards
Association E-78
videophones 6-29
View-based Access Control
Model 8-71
Virtual Circuit E-78
Virtual Device Driver E-78
Virtual Memory E-78
Virtual Memory Manager E-78
virtual private network
7-33, 8-19, E-78
Virtual Reality E-79
Virtual Reality Modeling Language E-79
Virus E-79
visual effects 7-29
VME bus 5-4
VMS E-79
VOD E-79
Voice over IP 5-25, 7-4, 7-33
VoIP 5-25, 7-4, 7-33
volatile(2) 8-29
Volume E-79
IN-14