Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Castelli M.J. — LAN switching first-step
Castelli M.J. — LAN switching first-step



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: LAN switching first-step

Автор: Castelli M.J.

Аннотация:

Network switches work by connecting network paths together and making intelligent decisions about moving traffic in a network. By keeping track of changes in the network, switches reduce congestion and improve speed.
No LAN switching expirience needed!


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 408

Добавлена в каталог: 28.05.2005

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
switched networks, components, common sftwr infrstrctr      2nd
switched networks, components, management tools      2nd
switched networks, components, physical switch platorm      
switched networks, components, routing platorm      
switched networks, components, VLANs      2nd
switched networks, managing      2nd 3rd
switched networks, managing, accounting      
switched networks, managing, acounting      
switched networks, managing, configuration      2nd
switched networks, managing, faults      2nd
switched networks, managing, performance      2nd
switched networks, managing, security      
switched networks, network analyzers      
switched networks, protocols      
switched networks, protocols, RMON      2nd 3rd
switched networks, protocols, RMON2      
switched networks, protocols, SMNP      2nd 3rd
switched networks, security      2nd 3rd
switched networks, SPAN      
switched networks, topology changes      
Switched Port Analyzer      [See SPAN]
switches      2nd 3rd 4th 5th
switches, address-based VLANs      
switches, ARP attacks      
switches, ASICs      
switches, backbone switch      
switches, bandwidth      2nd
switches, benefits      
switches, BPDU messages      
switches, breaking up collision domains      
switches, broadcasting      
switches, broadcasts      2nd
switches, campus LAN benefits      2nd
switches, characterizing by forwarding method      
switches, collapsed backbone networks      
switches, convergence      2nd
switches, cut-through method      
switches, cut-through switches      2nd
switches, data link layer      
switches, data link layer (OSI)      
switches, data link layer, benefits      
switches, dedicated-media LANs      
switches, designated ports      
switches, designated switches      
switches, dtrmining chnges in ntwrk tplgy      
switches, Ethernet      2nd 3rd 4th 5th
switches, extending VLANs across      
switches, filtering      
switches, firewalls      
switches, fragment-free switches      
switches, functioning as firewalls      
switches, functioning as multiport bridges      
switches, hubs (versus)      
switches, identifiers      
switches, IDS modules      
switches, interconnecting bridges      
switches, LAN traffic benefits      
switches, Layer 3 switches
switches, loops      
switches, MAC addresses      
switches, MAC addresses, total supply      
switches, MAC flooding attack      
switches, MAC tables      
switches, MAUs (versus)      
switches, media dependence      2nd
switches, multilayer switching      
switches, multiswitch LANs      
switches, network contention      
switches, network latency      
switches, network layer      
switches, network layer, identifying host locations      
switches, network layer, versus routers      
switches, network segmentation      
switches, nonblocking service      
switches, operation      2nd 3rd
switches, port costs      2nd
switches, port numbers (multiples of two)      
switches, port security enabled on      
switches, port states      
switches, potential vulnerability (to attack)      
switches, preferable for high bndwidth rqrmnts      
switches, protocols      
switches, QoS      
switches, QoS capability      
switches, reading addresses      
switches, reading addresses, Layer 2 vs. Layer 3
switches, recomputing network topology      
switches, removing loops      
switches, replacing in a large network      
switches, RMON groups      
switches, RMON groups, Cisco supported      
switches, root ports      
switches, root switch      
switches, routers (versus)      
switches, scalability      
switches, scaling network growth      
switches, security      2nd
switches, security, Layer 3 interfaces
switches, segmenting      
switches, segmenting networks      
switches, shared-media networks      
switches, single-switch LANs      
switches, star topology      
switches, store-and-forward method      
switches, store-and-forward switches      2nd
switches, STP      
switches, STP, bridge priority values      
switches, subnetting      2nd
switches, table lookups      
switches, vendors favoring over hubs      
switches, VLAN communication      
switches, VLAN interoperability      
switches, VLANs      
switches, VLANs, management ports      
switches, VTP management domains      
switches, VTP modes      
switches, wire-speed switches      
switches, working like transparent bridges      
Switching      
switching, campus LAN benefits      2nd
switching, case studies      
switching, case studies, bridge-based networks      2nd 3rd
switching, case studies, hub-based networks      2nd 3rd 4th 5th
switching, case studies, med/lrg swtch-bsed ntwrks      2nd
switching, case studies, small switch-based networks      2nd 3rd
switching, case studies, VLANs      2nd
switching, CRC      
switching, data link layer      2nd
switching, data-link addresses      
switching, distrbtd routing/switching routing      
switching, distribution layer considrtns      
switching, flat ntwrk tplgy      
switching, flat ntwrk tplgy, Layer 2      2nd
switching, forwarding decisions      2nd
switching, fragmenting frames/packets      
switching, hierarchcl tplgy      
switching, hierarchcl tplgy, Layer 3      2nd
switching, Layer 2 methods      2nd 3rd 4th 5th 6th
switching, Layer 2 methods, cut-through      2nd 3rd
switching, Layer 2 methods, fragment-free      2nd
switching, Layer 2 methods, str-n-frwd      2nd 3rd
switching, Layer 3 methods      2nd 3rd 4th
switching, Layer 3 switching/routing
switching, lrg swtchd/minimal routing      2nd
switching, mixed-media LANs      
switching, multilayer switching      
switching, multiport bridges      
switching, network layer      2nd
switching, packet switching      2nd
switching, packet switching, ARP mapping      2nd 3rd
switching, packet switching, routing table lookup      2nd 3rd 4th
switching, scalable switching      2nd
switching, security      
switching, store-and-forward      
switching, store-and-forward, multilayer      
switching, translation functions      
switching, transparent switching      
switching, trunk links      
switching, versus routing      
Synchronous optical network      [See SONET]
T1 lines      
T1 lines, RJ connectors      
TACACS+ ()      
Telecomm In Ass      [See TIA]
Throughput      
throughput, performance mgt      
TIA ()      
Token Ring      
Token Ring group (RMON)      
Token Ring, Ethernet (versus)      2nd
Token Ring, interfaces      
Token Ring, inventor      2nd
Token Ring, logical topology      
Token Ring, nodes      
Token Ring, packet switching      
Token Ring, physical topology      
Token Ring, reading Layer 2 addresses
Token Ring, ring topology      
Token Ring, RJ connectors      
Token Ring, RMON groups      
Token Ring, transfer rates      
Token Ring, UTP      
Token Ring, valid frame sizes      
Tokens      2nd 3rd
topologies      [See network topologies]
topology (defined)      
traffic filtering      
traffic flow      [See data flow]
trailers (frames)      2nd 3rd
trailers (frames), functions      
transceiver (defined)      
transfer rates      
transfer rates, Ethernet      2nd 3rd
transfer rates, FDDI      
transfer rates, Token Ring      
transmission media      
transmission methods      2nd
transmission methods, broadcast      2nd
transmission methods, multicast      2nd
transmission methods, unicast      2nd
transmission modes      
transmission modes, full-duplex      2nd
transmission modes, half-duplex      
transmission modes, simplex      
transmitters      
Transparent bridges      
transparent bridges, switches      
transparent mode (VTP)      
transparent switching      
transport layer (OSI)      
transport layer (OSI), segments      
TRAP messages (SNMP)      
traps      
traps, fault management      
Tree topology      2nd 3rd
tree topology, bridg n switc intrconectin      
Trmnl Accss Cntrllr Accss Cntrl Pls      [See TACACS+]
troubleshooting      
troubleshooting, network analyzers      
troubleshooting, network management      
trunk links      
trunk links, versus access links      
trunk links, VLAN tagging      
trunk ports      
trunk ports, port security      
twisted-pair cable      2nd 3rd
twisted-pair cable, STP      
twisted-pair cable, UDP      
unicast (transmission method)      2nd
unshielded twisted-pair      2nd [See UTP] [See UTP]
user segments (Ethernet)      
user sets      
user sets, security      
utilization      [See network utilization]
UTP ()      2nd
UTP (), EMI      
UTP (), RFI      
UTP (), transmission rates      
vendor-assigned addresses      
vendor-assigned addresses, MAC address component      
virtual circuits      
virtual LANs      [See VLANs]
VLAN 1      
VLAN 1, VTP pruning      
VLAN identification numbers      
VLAN tagging      2nd 3rd
VLAN tagging, IEEE 802.1q      
VLAN tagging, ISL      
VLAN trunking      
VLAN trunking protocol      2nd [See VTP]
VLAN trunking, security      
VLANs      
VLANs ()      2nd
VLANs (), 80/20 rule      
VLANs (), address-based VLANs      2nd 3rd
VLANs (), advantages of using      
VLANs (), advantages of VTP      
VLANs (), assigning end nodes      
VLANs (), assigning network devices      
VLANs (), benefits      
VLANs (), broadcast domains      
VLANs (), design considerations      2nd
VLANs (), designated switches      
VLANs (), Ethernet      
VLANs (), extending      2nd
VLANs (), identification numbers      
VLANs (), IEEE 802.1q      
VLANs (), implementing      2nd
VLANs (), infrastructure      
VLANs (), inter-VLAN communication      2nd
VLANs (), Layer 3-based VLANs      
VLANs (), limiting node numbers      
VLANs (), membership      2nd 3rd 4th
VLANs (), network attacks      2nd
VLANs (), network attacks, ARP attacks      2nd
VLANs (), network attacks, MAC flooding      2nd
VLANs (), ntwrk attcks      
VLANs (), ntwrk attcks, multcst b-f attcks      
VLANs (), ntwrk attcks, prvt VLAN attcks      2nd
VLANs (), ntwrk attcks, rndm frame-stress atcks      
VLANs (), ntwrk attcks, spnng-tr attcks      
VLANs (), operation      2nd 3rd 4th 5th 6th 7th 8th
VLANs (), overview      2nd
VLANs (), port-based VLANs      2nd
VLANs (), replacing hubs with switches      
VLANs (), routers      
VLANs (), routers required      
VLANs (), routing mechanisms      
VLANs (), scalability      
VLANs (), security      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
VLANs (), security, management ports      
VLANs (), supporting STP      
VLANs (), switches      
VLANs (), tagging      2nd 3rd
VLANs (), topology      2nd
VLANs (), trunk links      
VLANs (), types of      2nd 3rd
VLANs (), well-behaved VLANs      
VLANs (virtual LANs)      
VLANs, broadcast control      
1 2 3 4 5 6 7
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте