Index: C
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: C
- cabling
 
  
  - Ethernet: 1.2. Physical and data link layers 
 
  
  - networks: 17.1.1. Local network interface
 
 
- cache consistency checks: 7.4.1. File attribute caching
 
- caching: 3.3.7. Map structure
 
  - 7.4. Caching
 
  
  - attributes: 18.6. Attribute caching
 
  
  - benchmarking and: 16.3. Benchmarking
 
  
  - buffer cache: 7.3.2. Client I/O system
 
  
  - client data: 7.4.2. Client data caching
 
  
  - directory content (debugging case study): 15.4. Incorrect directory content caching
 
  
  - disk array: 16.5.4.2. Disk array caching and Prestoserve
 
  
  - DNLC: 7.4.3. Server-side caching
 
  
  - file attributes: 7.4.1. File attribute caching
 
  
  - file cache: 7.3.2. Client I/O system
 
  
  - inode cache: 7.4.3. Server-side caching
 
  
  - server-side: 7.4.3. Server-side caching
 
 
- canonical form: 1.5.2. External data representation
 
  
  - byte ordering and: 1.5.2. External data representation
 
 
- capture filters: 13.5.3. Capture filters
 
- carrier sense, networks: 17.1.2. Collisions and network saturation
 
- centralized management: 5.4. Centralized versus distributed management
 
- chmod( ) system call, virtual filesystem and: 7.2. NFS protocol and implementation
 
- chown( ) system call, vnode interface and: 7.1. Virtual filesystems and virtual nodes
 
- CIFS (Common Internet File System): 10.2.1. NFS versus SMB (CIFS)
 
- classes of network numbers: 1.3.3. IPv4 address classes
 
- classless IP addressing: 1.3.4. Classless IP addressing
 
- client binding, NIS tools: 13.4.2. Displaying and analyzing client bindings
 
- client only NIS: 3.1. Masters, slaves, and clients
 
- client-server model
 
  
  - presentation layer: 1.5.1. The client-server model
 
  
  - session layer and: 1.5.1. The client-server model
 
 
- client-server NIS: 3.1. Masters, slaves, and clients
 
- client-side failover: 6.5. Replication
 
- client-side performance tuning: 18. Client-Side Performance Tuning
 
- client-to-client relationships, trusted hosts and users: 12.1.1. Trusted hosts and trusted users
 
- client-to-server relationships, trusted hosts and users: 12.1.1. Trusted hosts and trusted users
 
- ClientName field, NFS log record: 14.6. NFS server logging
 
- clients: 3.2.3. Installing NIS slave servers
 
  
  - data caching: 7.4.2. Client data caching
 
  
  - dataless: 8.7. Configuration options
 
  
  - diskless (see diskless clients)
 
  
  - DNS: 5.2.3. Run DNS on NIS clients and servers
 
  
  - filehandles and: 7.2.5. Pathnames and filehandles
 
  
  - hosts file, bypassing: 3.1. Masters, slaves, and clients
 
  
  - I/O system: 7.3.2. Client I/O system
 
  
  - lock recovery: 7.5.2. Client lock recovery
 
  
  - lookups: 3.3.9. The ypserv daemon
 
  
  - maps and: 3.1. Masters, slaves, and clients
 
  
  - names, AdminSuite: 8.2. Setting up a diskless client
 
  
  - network interface, bottlenecks: 16.4.1. Problem areas
 
  
     - NFS, troubleshooting:  B.2. NFS client problems
 
  
  - NIS
 
    
    - client binding: 13.4.4. Setting initial client bindings
 
    
    - enabling: 3.2. Basics of NIS management
 
      - 3.2.4. Enabling NIS on client hosts
 
    
 
  
 
  
  - NLM, crashes: 11.2.2.2. Client crash
 
  
  - rebotting after restore: 7.2.5. Pathnames and filehandles
 
  
  - servers as: 3.3.11. NIS server as an NIS client
 
  
  - shutdown, unmounting filesystems: 14.1. NFS administration tools
 
 
- client/server distribution: 8.9. Client/server ratios
 
- client/server rations, diskless clients: 8.9. Client/server ratios
 
   - clnt_idle_timeout parameter:  C. Tunable Parameters
 
   - clnt_max_conns parameter:  C. Tunable Parameters
 
- close( ) system call, releasing data blocks: 7.2.4. Preserving Unix filesystem semantics
 
- collision rate: 17.1.2. Collisions and network saturation
 
- collisions: 17.1.2. Collisions and network saturation
 
  
  - input errors: 17.1.1. Local network interface
 
  
  - machine addition and: 17.1.2. Collisions and network saturation
 
  
  - network saturation and: 17.1.2. Collisions and network saturation
 
 
- command-line, automounter master map: 9.2.2. Command-line options
 
- commands
 
  
  - admhostadd: 8.2. Setting up a diskless client
 
  
  - cp: 3.3.5. Map files
 
  
  - domainname: 3.2.2. Installing the NIS master server
 
    - 3.2.2. Installing the NIS master server
 
    - 3.3.8. NIS domains
 
    - 3.3.8. NIS domains
 
  
 
  
  - mount: 6.3.2. Using mount
 
    
    - Solaris: 6.3.3. Mount options
 
  
 
  
  - mount(1M): 6.3. Mounting filesystems
 
  
  - mv: 3.3.5. Map files
 
  
  - nfsstat: 6.5. Replication
 
  
  - rsh, remote execution: 12.1. User-oriented network security
 
  
  - share: 6.2. Exporting filesystems
 
    
    - exporting filesystems: 6.2.2. Exporting options
 
  
 
  
  - showmount: 14.1. NFS administration tools
 
  
  - solstice: 8.2. Setting up a diskless client
 
  
  - whoami: 12.3.3. Unknown password entries
 
  
  - ypmatch: 13.4.1. Key lookup
 
  
  - ypwhich: 13.4.2. Displaying and analyzing client bindings
 
 
- compilers, data representation and: 1.5.2. External data representation
 
- comp.protocols.nfs newsgroup, PC/NFS and: 10.1. PC/NFS today
 
- computing environments: 0. Preface
 
- configuration
 
  
  - bottlenecks and: 16.4.1. Problem areas
 
  
  - diskless: 8.8. Brief introduction to JumpStart administration
 
  
  - diskless clients: 8.7. Configuration options
 
  
  - information, NFS: 1. Networking Fundamentals
 
  
  - interface (ifconfig): 13.2.1. ifconfig: interface configuration
 
  
  - JumpStart: 8.8. Brief introduction to JumpStart administration
 
  
  - kernel, server performance tuning: 16.5.5. Kernel configuration
 
  
  - netinstall clients: 8.2. Setting up a diskless client
 
  
  - nfslogd daemon behavior: 14.6.8. Other configuration parameters
 
  
  - PC/NFS: 10.3. Configuring PC/NFS
 
    - 10.3. Configuring PC/NFS
 
  
 
  
  - server logging: 14.6.3. NFS server logging configuration
 
  
  - servers, diskless clients: 8. Diskless Clients
 
 
- configuration files
 
  
  - NIS: 0. Preface
 
    
    - copies: 3. Network Information Service Operation
 
    
    - database: 1. Networking Fundamentals
 
  
 
 
- congested networks: 17.1. Network congestion and network interfaces
 
- connected machines, IP addresses: 1.3.2. IP host addresses
 
- connection-oriented services: 1.5.3. Internet and RPC server configuration
 
- connectionless services: 1.5.3. Internet and RPC server configuration
 
- connectivity, pinging and: 13.2.4. Using ping to check network connectivity
 
- context switching, nfsd threads: 16.5.2.1. Context switching overhead
 
- conventions used in book: 0.4. Conventions used in this book
 
- copying maps: 3.3.5. Map files
 
- cp command: 3.3.5. Map files
 
- CPU loading
 
  
  - server: 16.4.1. Problem areas
 
  
  - server performance tuning: 16.5.1. CPU loading
 
  
  - utilities: 16.5.1. CPU loading
 
 
- crashes, NFS protocol: 7.2.2. Statelessness and crash recovery
 
- CRC checksums: 17.1.1. Local network interface
 
- cron, viruses and: 12.6. Viruses
 
- cross-mounting filesystems: 16.5.6. Cross-mounting filesystems
 
- cryptography: 12.5.2. Brief introduction to cryptography 
 
  
  - asymmetric key encryption: 12.5.2.2. Asymmetric key encryption
 
  
  - MAC: 12.5.2.4. One-way hash functions and MACs
 
  
  - one-way hash functions: 12.5.2.4. One-way hash functions and MACs
 
  
  - public key exchange: 12.5.2.3. Public key exchange
 
  
  - symmetric key encryption: 12.5.2.1. Symmetric key encryption
 
 
- CYCLE_FREQUENCY parameter, nfslogd daemon: 14.6.8. Other configuration parameters
 
- cycling logs: 14.6.6. NFS log cycling
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.