Index: L
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: L
- layers
 
  
  - data link: 1.2. Physical and data link layers 
 
  
  - network: 1.3. Network layer
 
  
  - network protocols: 1.1. Networking overview
 
  
  - stacks: 1.1. Networking overview
 
  
  - see also ISO: 1.2. Physical and data link layers 
 
 
- LDAP (Lightweight Directory Access Protocol): 2.2.5. Lightweight Directory Access Protocol (LDAP)
 
- levels, stacks: 1.1. Networking overview
 
- libpcap (Packet Capture Library): 13.5.3. Capture filters
 
- line printer spooling, Kerberos V5: 12.5.5.1. Kerberos V5
 
- link operations, RPC procedures, NFS: 7.2.1. NFS RPC procedures
 
- local files
 
  
  - appended: 3.3.1. Working with the maps
 
  
  - map integration: 3.3.4. Integrating NIS maps with local files
 
  
  - NIS: 3.2.2. Installing the NIS master server
 
 
- local network interface: 17.1.1. Local network interface
 
- local password files: 3.3.1. Working with the maps
 
- lock daemon: 7.5.1. Lock and status daemons
 
- lockd daemon, NFS startup: 6.1. Setting up NFS
 
- locking files: 7.5. File locking
 
  
  - advisory locking: 11.1.3. Mandatory versus advisory locking
 
  
  - mandatory locking: 11.1.3. Mandatory versus advisory locking
 
    
    - NFS: 11.2.3. Mandatory locking and NFS
 
  
 
  
  - NFS: 11.2. NFS and file locking
 
  
  - NLM protocol: 11.2.1. The NLM protocol
 
  
  - NLM, recovery: 11.2.2. NLM recovery
 
  
  - overview: 11.1. What is file locking? 
 
  
  - re-establishing locks: 7.5.3. Recreating state information
 
  
  - troubleshooting: 11.3. Troubleshooting locking problems
 
  
  - unenforced locking: 11.1.3. Mandatory versus advisory locking
 
  
  - Windows: 11.2.4. NFS and Windows lock semantics
 
  
  - Windows/NT: 11.1.4. Windows/NT locking scheme
 
 
- log files: 14.6.1. NFS server logging mechanics
 
- log record fields: 14.6. NFS server logging
 
- logical network: 17.2. Network partitioning hardware
 
- login restrictions: 12.1. User-oriented network security
 
- logs
 
  
  - basic format: 14.6.3.1. Basic versus extended log format
 
  
  - cycling: 14.6.6. NFS log cycling
 
  
  - enabling logging, share command: 14.6.1. NFS server logging mechanics
 
  
  - extended format: 14.6.3.1. Basic versus extended log format
 
  
  - filehandle, path mapping and: 14.6.5. Filehandle to path mapping
 
  
  - NFS server logging
 
    
    - configuration: 14.6.3. NFS server logging configuration
 
    
    - enabling: 14.6.2. Enabling NFS server logging
 
  
 
  
  - nfslogd daemon: 14.6.4. The nfslogd daemon
 
  
  - NIS: 3.3.9. The ypserv daemon
 
  
  - server logging, disabling: 14.6.9. Disabling NFS server logging
 
  
  - servers: 14.6.1. NFS server logging mechanics
 
 
- lookup operations
 
  
  - filehandles and: 7.2.5. Pathnames and filehandles
 
  
  - RPC procedures, NFS and: 7.2.1. NFS RPC procedures
 
 
- lookups, client: 3.3.9. The ypserv daemon
 
- LOOPBACK flag, ifconfig: 13.2.1.1. Examining interfaces
 
- loopback interface: 1.2.1. Frames and network interfaces
 
  - 1.2.1. Frames and network interfaces
 
  
  - IPv6: 1.3.6.2. IP Version 6 loopback address
 
  
  - network numbers and: 1.3.3. IPv4 address classes
 
 
- low-bandwidth networks, partitioning: 17.3. Network infrastructure
 
- lseek( ): 3.3.5. Map files
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.