Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: C
- cabling
- Ethernet: 1.2. Physical and data link layers
- networks: 17.1.1. Local network interface
- cache consistency checks: 7.4.1. File attribute caching
- caching: 3.3.7. Map structure
- 7.4. Caching
- attributes: 18.6. Attribute caching
- benchmarking and: 16.3. Benchmarking
- buffer cache: 7.3.2. Client I/O system
- client data: 7.4.2. Client data caching
- directory content (debugging case study): 15.4. Incorrect directory content caching
- disk array: 16.5.4.2. Disk array caching and Prestoserve
- DNLC: 7.4.3. Server-side caching
- file attributes: 7.4.1. File attribute caching
- file cache: 7.3.2. Client I/O system
- inode cache: 7.4.3. Server-side caching
- server-side: 7.4.3. Server-side caching
- canonical form: 1.5.2. External data representation
- byte ordering and: 1.5.2. External data representation
- capture filters: 13.5.3. Capture filters
- carrier sense, networks: 17.1.2. Collisions and network saturation
- centralized management: 5.4. Centralized versus distributed management
- chmod( ) system call, virtual filesystem and: 7.2. NFS protocol and implementation
- chown( ) system call, vnode interface and: 7.1. Virtual filesystems and virtual nodes
- CIFS (Common Internet File System): 10.2.1. NFS versus SMB (CIFS)
- classes of network numbers: 1.3.3. IPv4 address classes
- classless IP addressing: 1.3.4. Classless IP addressing
- client binding, NIS tools: 13.4.2. Displaying and analyzing client bindings
- client only NIS: 3.1. Masters, slaves, and clients
- client-server model
- presentation layer: 1.5.1. The client-server model
- session layer and: 1.5.1. The client-server model
- client-server NIS: 3.1. Masters, slaves, and clients
- client-side failover: 6.5. Replication
- client-side performance tuning: 18. Client-Side Performance Tuning
- client-to-client relationships, trusted hosts and users: 12.1.1. Trusted hosts and trusted users
- client-to-server relationships, trusted hosts and users: 12.1.1. Trusted hosts and trusted users
- ClientName field, NFS log record: 14.6. NFS server logging
- clients: 3.2.3. Installing NIS slave servers
- data caching: 7.4.2. Client data caching
- dataless: 8.7. Configuration options
- diskless (see diskless clients)
- DNS: 5.2.3. Run DNS on NIS clients and servers
- filehandles and: 7.2.5. Pathnames and filehandles
- hosts file, bypassing: 3.1. Masters, slaves, and clients
- I/O system: 7.3.2. Client I/O system
- lock recovery: 7.5.2. Client lock recovery
- lookups: 3.3.9. The ypserv daemon
- maps and: 3.1. Masters, slaves, and clients
- names, AdminSuite: 8.2. Setting up a diskless client
- network interface, bottlenecks: 16.4.1. Problem areas
- NFS, troubleshooting: B.2. NFS client problems
- NIS
- client binding: 13.4.4. Setting initial client bindings
- enabling: 3.2. Basics of NIS management
- 3.2.4. Enabling NIS on client hosts
- NLM, crashes: 11.2.2.2. Client crash
- rebotting after restore: 7.2.5. Pathnames and filehandles
- servers as: 3.3.11. NIS server as an NIS client
- shutdown, unmounting filesystems: 14.1. NFS administration tools
- client/server distribution: 8.9. Client/server ratios
- client/server rations, diskless clients: 8.9. Client/server ratios
- clnt_idle_timeout parameter: C. Tunable Parameters
- clnt_max_conns parameter: C. Tunable Parameters
- close( ) system call, releasing data blocks: 7.2.4. Preserving Unix filesystem semantics
- collision rate: 17.1.2. Collisions and network saturation
- collisions: 17.1.2. Collisions and network saturation
- input errors: 17.1.1. Local network interface
- machine addition and: 17.1.2. Collisions and network saturation
- network saturation and: 17.1.2. Collisions and network saturation
- command-line, automounter master map: 9.2.2. Command-line options
- commands
- admhostadd: 8.2. Setting up a diskless client
- cp: 3.3.5. Map files
- domainname: 3.2.2. Installing the NIS master server
- 3.2.2. Installing the NIS master server
- 3.3.8. NIS domains
- 3.3.8. NIS domains
- mount: 6.3.2. Using mount
- Solaris: 6.3.3. Mount options
- mount(1M): 6.3. Mounting filesystems
- mv: 3.3.5. Map files
- nfsstat: 6.5. Replication
- rsh, remote execution: 12.1. User-oriented network security
- share: 6.2. Exporting filesystems
- exporting filesystems: 6.2.2. Exporting options
- showmount: 14.1. NFS administration tools
- solstice: 8.2. Setting up a diskless client
- whoami: 12.3.3. Unknown password entries
- ypmatch: 13.4.1. Key lookup
- ypwhich: 13.4.2. Displaying and analyzing client bindings
- compilers, data representation and: 1.5.2. External data representation
- comp.protocols.nfs newsgroup, PC/NFS and: 10.1. PC/NFS today
- computing environments: 0. Preface
- configuration
- bottlenecks and: 16.4.1. Problem areas
- diskless: 8.8. Brief introduction to JumpStart administration
- diskless clients: 8.7. Configuration options
- information, NFS: 1. Networking Fundamentals
- interface (ifconfig): 13.2.1. ifconfig: interface configuration
- JumpStart: 8.8. Brief introduction to JumpStart administration
- kernel, server performance tuning: 16.5.5. Kernel configuration
- netinstall clients: 8.2. Setting up a diskless client
- nfslogd daemon behavior: 14.6.8. Other configuration parameters
- PC/NFS: 10.3. Configuring PC/NFS
- 10.3. Configuring PC/NFS
- server logging: 14.6.3. NFS server logging configuration
- servers, diskless clients: 8. Diskless Clients
- configuration files
- NIS: 0. Preface
- copies: 3. Network Information Service Operation
- database: 1. Networking Fundamentals
- congested networks: 17.1. Network congestion and network interfaces
- connected machines, IP addresses: 1.3.2. IP host addresses
- connection-oriented services: 1.5.3. Internet and RPC server configuration
- connectionless services: 1.5.3. Internet and RPC server configuration
- connectivity, pinging and: 13.2.4. Using ping to check network connectivity
- context switching, nfsd threads: 16.5.2.1. Context switching overhead
- conventions used in book: 0.4. Conventions used in this book
- copying maps: 3.3.5. Map files
- cp command: 3.3.5. Map files
- CPU loading
- server: 16.4.1. Problem areas
- server performance tuning: 16.5.1. CPU loading
- utilities: 16.5.1. CPU loading
- crashes, NFS protocol: 7.2.2. Statelessness and crash recovery
- CRC checksums: 17.1.1. Local network interface
- cron, viruses and: 12.6. Viruses
- cross-mounting filesystems: 16.5.6. Cross-mounting filesystems
- cryptography: 12.5.2. Brief introduction to cryptography
- asymmetric key encryption: 12.5.2.2. Asymmetric key encryption
- MAC: 12.5.2.4. One-way hash functions and MACs
- one-way hash functions: 12.5.2.4. One-way hash functions and MACs
- public key exchange: 12.5.2.3. Public key exchange
- symmetric key encryption: 12.5.2.1. Symmetric key encryption
- CYCLE_FREQUENCY parameter, nfslogd daemon: 14.6.8. Other configuration parameters
- cycling logs: 14.6.6. NFS log cycling
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.
|