Index: F
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: F
- FDDI (Fiber Distributed Data Interface) networks: 17.3.2. ATM and FDDI networks
 
- federation management: 5.4. Centralized versus distributed management
 
- fiber optics, TCP/IP and: 1.1. Networking overview
 
- fields, log records: 14.6. NFS server logging
 
- file attributes, caching and: 7.4.1. File attribute caching
 
  - 18.6. Attribute caching
 
 
- file blocks
 
  
  - client data caching and: 7.4.2. Client data caching
 
  
  - writing, NFS design: 7.2.2. Statelessness and crash recovery
 
 
- file cache: 7.3.2. Client I/O system
 
- file locking: 7.5. File locking
 
  - 11.2.1. The NLM protocol
 
  
  - advisory locking: 11.1.3. Mandatory versus advisory locking
 
  
  - mandatory locking: 11.1.3. Mandatory versus advisory locking
 
    
    - NFS and: 11.2.3. Mandatory locking and NFS
 
  
 
  
  - NFS: 11.2. NFS and file locking
 
  
  - NLM protocol: 11.2.1. The NLM protocol
 
    
    - recovery: 11.2.2. NLM recovery
 
  
 
  
  - O_EXCL flag: 11.1. What is file locking? 
 
  
  - overview: 11.1. What is file locking? 
 
  
  - record locks: 11.1.2. Record locks
 
  
  - troubleshooting: 11.3. Troubleshooting locking problems
 
  
  - unenforced locking: 11.1.3. Mandatory versus advisory locking
 
  
  - Windows and: 11.2.4. NFS and Windows lock semantics
 
  
  - Windows/NT: 11.1.4. Windows/NT locking scheme
 
 
- file management, maps: 4.2. Managing map files
 
- file permissions, PC/NFS: 10.4.2. Checking file permissions
 
- file transfers
 
  
  - information consolidation: 14.6.4.1. Consolidating file transfer information
 
  
  - traffic and: 16.1. Characterization of NFS behavior
 
 
- filehandles
 
  
  - client and: 7.2.5. Pathnames and filehandles
 
  
  - inodes: 7.2.5. Pathnames and filehandles
 
  
  - NFS: 7.2.5. Pathnames and filehandles
 
  
  - path mapping and: 14.6.5. Filehandle to path mapping
 
  
  - stale, performance and: 18.8. Stale filehandles
 
 
- filenames, UNIX to DOS: 10.4.3. Unix to Windows/NT text file conversion
 
- files
 
  
  - administrative
 
    
    - appending: 3.2.4. Enabling NIS on client hosts
 
    
    - deleting: 3.2.4. Enabling NIS on client hosts
 
    
    - referencing: 3.2.4. Enabling NIS on client hosts
 
  
 
  
  - conversion
 
    
    - ASCII to DBM: 3.3.6. Map naming
 
    
    - UNIX to DOS: 10.4.3. Unix to Windows/NT text file conversion
 
  
 
  
  - entries referring to NIS database: 3.3.1. Working with the maps
 
  
  - log files: 14.6.1. NFS server logging mechanics
 
  
  - map files
 
    
    - dependences: 4.2.3. Map file dependencies
 
    
    - updating: 4.2. Managing map files
 
  
 
  
  - NIS, managed under: 3.3. Files managed under NIS
 
  
  - NIS supported: 3.3. Files managed under NIS
 
  
  - password, updates: 4.2.4. Password file updates
 
  
  - permissions, DOS: 10.4.2. Checking file permissions
 
  
  - size, NFS version 3: 7.2.6. NFS Version 3
 
  
  - timestamps, empty: 4.2.3. Map file dependencies
 
  
  - writing to, buffer cache and: 7.3.2. Client I/O system
 
 
- fileservers, restoring from dump tape: 7.2.5. Pathnames and filehandles
 
- filesystems
 
  
  - access, security: 12.4.4. Access to filesystems
 
  
  - cross-mounting: 16.5.6. Cross-mounting filesystems
 
  
  - diskless clients: 8.2. Setting up a diskless client
 
  
  - exporting
 
    
    - guidelines: 6.2.1. Rules for exporting filesystems
 
    
    - options for: 6.2.2. Exporting options
 
  
 
  
  - freespace: 7.1. Virtual filesystems and virtual nodes
 
  
  - hosts, protection from: 12.4.4. Access to filesystems
 
  
  - iostat utility: 14.2.1. I/O statistics
 
  
  - mount command: 6.3.2. Using mount
 
  
  - mounting: 6.4. Symbolic links
 
    
    - NFS: 6.3. Mounting filesystems
 
    
    - read-only: 6.3.3. Mount options
 
    
    - resolving problems: 6.3.6. Resolving mount problems
 
  
 
  
  - naming schemes: 6.6. Naming schemes
 
  
  - NFS
 
    
    - exporting: 6.2. Exporting filesystems
 
    
    - mount command: 6.3.2. Using mount
 
    
    - mounting: 1. Networking Fundamentals
 
      - 6. System Administration Using the Network File System
 
    
 
    
    - naming: 6. System Administration Using the Network File System
 
    
    - operations, RPC procedures: 7.2.1. NFS RPC procedures
 
    
    - remote: 0. Preface
 
  
 
  
  - transparency: 7. Network File System Design and Operation
 
  
  - Unix, preserving semantics: 7.2.4. Preserving Unix filesystem semantics
 
  
  - VFS interface, integration: 7.2.4. Preserving Unix filesystem semantics
 
 
- filtering protocols: 17.5. Protocol filtering
 
- filters
 
  
  - capture filters: 13.5.3. Capture filters
 
  
  - ethereal/tethereal: 14.4.2. Useful filters
 
  
  - read filters: 13.5.4. Read filters
 
  
  - snoop: 14.3.1. Useful filters
 
 
- firewalls: 12.4.7. Using NFS through firewalls
 
- flags: 3.2.3. Installing NIS slave servers
 
  
  - ifconfig: 13.2.1.1. Examining interfaces
 
  
  - see also options: 3.2.3. Installing NIS slave servers
 
 
- floating point numbers, data representation and: 1.5.2. External data representation
 
- flock( ) system call, file locking: 11.1. What is file locking? 
 
- forwardable credentials, Kerberos V5: 12.5.5.1. Kerberos V5
 
- fragmentation: 1.3.1. Datagrams and packets
 
- frames, data link layer: 1.2.1. Frames and network interfaces
 
- ftp: 1.5.3. Internet and RPC server configuration
 
  - 1.5.3. Internet and RPC server configuration
 
  
  - tftp: 8.3.2. Getting a boot block
 
 
- FTP, NFS Server Logging utility and: 14.6. NFS server logging
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.