|
|
Авторизация |
|
|
Поиск по указателям |
|
|
|
|
|
|
|
|
|
|
Castelli M.J. — LAN switching first-step |
|
|
Предметный указатель |
10,000-Mbps Ethernet [See 10Gigabit Ethernet]
10-Mbps Ethernet [See Ethernet]
100-Mbps Ethernet [See Fast Ethernet]
1000-Mbps Ethernet [See Gigabit Ethernet]
100Base-T 2nd
1019843
1019856
1019857
1020390
1020552
1020590
1020591
1020593
1020595
1020597
1020604
1020664
10Base-T 2nd 3rd
10Gigabit Ethernet
10Gigabit Ethernet, IEEE 802.3ae
10Gigabit Ethernet, incrmntg trnk speeds
1887
21875
38990
38997
39023
39033
39042
39054
39271
39297
39303
473
474
479
480
481
5-4-3 rule (Ethernet)
502
55
59139
80/20 rule (VLANs)
AAA () model
AAA () model, network security
Access Control lists [See ACL]
access layer (HDM) 2nd 3rd
access links
access links, versus trunk links
Access methods 2nd 3rd 4th [See also specific methods]
accounting
Accounting Management 2nd
accounting, security
ACLs () 2nd
ACLs (), security
address resolution
Address Resolution Protocol 2nd [See ARP] [See ARP]
address resolution, ARP
address resolution, routers
address space
address space, data link vs. network layer
address-based VLANs 2nd
Adv Tele Sys Comm [See ATSV]
alarm group (RMON)
Algorithms
algorithms, back-off algorithm
algorithms, spanning-tree algorithm 2nd 3rd 4th 5th
algorithms, spanning-tree algorithm, root bridges
algorithms, spanning-tree algorithm, switch ports
Amer Nat Standards In [See ANSI]
analog repeaters
analog signals 2nd
analog signals, converting to digital
ANSI () 2nd
app-specific integrtd circuits [See ASICs]
application layer (OSI)
application layer (OSI), user data
application-specific int crct [See ASIC]
ARP () 2nd 3rd
ARP (), broadcast segmentation
ARP (), broadcasts
ARP attacks 2nd
ARP cache
ARP cache, routers
ARP mapping 2nd 3rd
ARP mapping, steady-state conditions
ARP poisoning [See ARP attacks]
ARP tables
ASIC ()
ASIC (), switching
ASICs ()
Asynchronous Transfer Mode [See ATM]
ATM ()
ATSV (Adv Tele Sys Com)
Authentication
authentication, security
authntctn, authrzatn, accnt [See AAA model]
Authorization
authorization, security
Availability
availability, performance mgt
back-off algorithm
backbone switches
backup (redundancy)
backup (redundancy), fault mgt
Bandwidth
bandwidth, accounting management
bandwidth, conserving via multicast
bandwidth, doubling Ethernet bandwidth
bandwidth, Ethernet
bandwidth, flat network topology
bandwidth, hubs
bandwidth, microsegmentation 2nd
bandwidth, network design
bandwidth, network designs
bandwidth, network traffic contending for
bandwidth, ntwrk management apps
bandwidth, performance mgt
bandwidth, routing inter-VLAN traffic
bandwidth, sharing
bandwidth, sharing, access layer layer
bandwidth, switches 2nd 3rd
bandwidth, switches, microsegmentation
bandwidth, twisted-pair cable
bandwidth, using switches fr hgh bndwdth rqrmnts
bandwidth, UTP
baselines
baselines, configuration mgt
baselines, performance management
beginpage.92AA13C1-3CAD-4D74-A095-ADFE9A
beginpage.C65D5663-9F16-11D5-8131-FDEC81
beginpage.C65D5665-9F16-11D5-8131-FDEC81
beginpage.C65D5671-9F16-11D5-8131-FDEC81
BGP ()
billing
billing, accounting management
binary conversion (to decimal or hexadecimal)
binary numbering
bit buckets
bit streams 2nd [See also signals]
bits 2nd
blocked state (paths)
blocking state
blocking state, RSTP
Border gateway protocol [See BGP]
BPDUs () 2nd
BPDUs (), bridges
BPDUs (), changes in network topology
BPDUs (), contents of
BPDUs (), determining superiority
BPDUs (), electing designated ports
| BPDUs (), selecting ports
BPDUs (), switches
BPDUs (), transmission rate (default)
BPDUs (), transparent switching
breaking up [See segmenting]
bridges
bridges, BPDU messages
bridges, BPDUs
bridges, building MAC tables
bridges, data link layer
bridges, data link layer (OSI)
bridges, Ethernet 2nd 3rd 4th
bridges, filtering
bridges, flooding
bridges, fragmenting frames impossible
bridges, functioning as multiport hubs 2nd
bridges, ID components
bridges, interconnecting switches
bridges, interface address tables
bridges, LAN bridges
bridges, MAC address lookup
bridges, MAC addresses 2nd
bridges, MAC flooding attack
bridges, multiport bridges
bridges, multiport bridges, switches functioning as
bridges, network segmentation
bridges, operation 2nd
bridges, port numbers (multiples of two)
bridges, preventing network congestion
bridges, priority
bridges, removing loops
bridges, repeaters and hubs (versus)
bridges, routers (versus)
bridges, STP
bridges, STP, port states
bridges, transparent bridges 2nd
bridges, versus IP routing lookups
bridges, WAN interfaces
bridging
bridging, data-link addresses
broadcast (defined)
broadcast (transmission method) 2nd
broadcast control 2nd 3rd 4th
broadcast domains
broadcast domains, breaking up with routers
broadcast domains, distribution layer
broadcast domains, flat network topology
broadcast domains, flat networks
broadcast domains, routers separating
broadcast domains, tradtonl vrsus VLAN
broadcast domains, VLANs 2nd
broadcast filters
broadcast filters, routing platforms
broadcast radiation
broadcast segmentation 2nd 3rd 4th
broadcast storms 2nd 3rd 4th
broadcasts 2nd
broadcasts, control
broadcasts, control, routers 2nd
broadcasts, IPX clients
broadcasts, segmentation 2nd
Cabling 2nd 3rd
cabling, coaxial 2nd
cabling, copper
cabling, EMI/RFI 2nd
cabling, Ethernet
cabling, Fast Ethernet
cabling, fiber-optic 2nd 3rd 4th 5th 6th
cabling, LAN connections
cabling, LAN vs. VLAN infrastructure
cabling, physical layer components
cabling, repeaters
cabling, security 2nd
cabling, STP 2nd
cabling, termination
cabling, twisted-pair 2nd 3rd
cabling, twisted-pair, STP 2nd
cabling, twisted-pair, UTP 2nd
cabling, UTP 2nd
cabling, UTP categories
cabling, UTP, transmission rates
cabling, wall plates/boxes 2nd
CAD/CAM () applications
CAD/CAM () applications, impacting networks
CAM ()
CAM (), secure port entries
campus LANs
campus LANs, design principals 2nd
campus LANs, distrbtd routing/switching
campus LANs, introducing switch benefits 2nd
campus LANs, lrg swtchd/minimal routing 2nd
campus LANs, scalable switching 2nd
capture group (RMON)
car sense multiaccess coll det [See CSMA/CD]
case studies
case studies, bridge-based networks 2nd 3rd
case studies, hub-based networks 2nd 3rd 4th 5th
case studies, med/lrg swtch-bsed ntwrks 2nd
case studies, small switch-based networks 2nd 3rd
case studies, VLANs 2nd
change control
checksum (defined)
ciphertext (defined)
Cisco IOS () interface
Cisco IOS () interface, port numbers
client mode (VTP)
Coaxial cable
collapsed backbone network (defined)
Collision detection
collision domains
collision domains, breaking up with switches
Collisions 2nd 3rd
collisions, Ethernet 2nd
collisions, late collisions 2nd
Confidentiality
confidentiality, mantainng traffc integrity
Configuration Management 2nd
congestion control
Content-addressable memory [See CAM]
Convergence 2nd 3rd 4th
convergence, fast convergence
convergence, STP
converting numbers
copper cable 2nd 3rd
core layer (HDM) 2nd 3rd
CRC ()
CRC (), adding to frame size
CRC (), Ethernet frame sizes
CRC (), multilayer switching
CSMA/CD
CSMA/CD ()
CSMA/CD (), collision domains
CSMA/CD (), collisions 2nd 3rd
CSMA/CD (), Ethernet 2nd 3rd 4th
CSMA/CD (), flat network topology
CSMA/CD (), operation 2nd
CSMA/CD (), retransmitting frames
CSMA/CD (), shared environments
CSMA/CD (), time slots
CSMA/CD, retransmission
cut-through method (switching)
cut-through switching 2nd 3rd
cyclic rendundancy check [See CRC]
daisy chaining
daisy chaining, hubs
dark fiber
dark fiber, WANs
data (defined)
data flow
data flow, bit streams
|
|
|
Реклама |
|
|
|