思维导图备注

Managing NFS and NIS, 2nd Editi - Mike Eisler; Ricardo Labiaga; H
首页 收藏书籍 阅读记录
  • 书签 我的书签
  • 添加书签 添加书签 移除书签 移除书签

1.1. Networking overview

浏览 5 扫码
  • 小字体
  • 中字体
  • 大字体
2022-02-24 01:36:17
请 登录 再阅读
上一篇:
下一篇:
  • 书签
  • 添加书签 移除书签
  • Preface
    • Who this book is for
    • Versions
    • Organization
    • Conventions used in this book
    • Differences between the first edition and second edition
    • Comments and questions
    • Hal's acknowledgments from the first edition
    • Acknowledgments for the second edition
      • Hal Stern's acknowledgments
      • Mike Eisler's acknowledgments
      • Ricardo Labiaga's acknowledgments
  • 1. Networking Fundamentals
    • 1.1. Networking overview
    • 1.2. Physical and data link layers
      • 1.2.1. Frames and network interfaces
      • 1.2.2. Ethernet addresses
    • 1.3. Network layer
      • 1.3.1. Datagrams and packets
      • 1.3.2. IP host addresses
      • 1.3.3. IPv4 address classes
      • 1.3.4. Classless IP addressing
      • 1.3.5. Virtual interfaces
      • 1.3.6. IP Version 6
    • 1.4. Transport layer
      • 1.4.1. TCP and UDP
      • 1.4.2. Port numbers
    • 1.5. The session and presentation layers
      • 1.5.1. The client-server model
      • 1.5.2. External data representation
      • 1.5.3. Internet and RPC server configuration
  • 2. Introduction to Directory Services
    • 2.1. Purpose of directory services
      • 2.1.1. The hosts database
    • 2.2. Brief survey of common directory services
      • 2.2.1. Directory Name Service (DNS)
      • 2.2.2. Network Information Service (NIS)
      • 2.2.3. NIS+
      • 2.2.4. X.500
      • 2.2.5. Lightweight Directory Access Protocol (LDAP)
      • 2.2.6. NT Domain
    • 2.3. Name service switch
    • 2.4. Which directory service to use
  • 3. Network Information Service Operation
    • 3.1. Masters, slaves, and clients
    • 3.2. Basics of NIS management
      • 3.2.1. Choosing NIS servers
      • 3.2.2. Installing the NIS master server
      • 3.2.3. Installing NIS slave servers
      • 3.2.4. Enabling NIS on client hosts
    • 3.3. Files managed under NIS
      • 3.3.1. Working with the maps
      • 3.3.2. Netgroups
      • 3.3.3. Hostname formats in netgroups
      • 3.3.4. Integrating NIS maps with local files
      • 3.3.5. Map files
      • 3.3.6. Map naming
      • 3.3.7. Map structure
      • 3.3.8. NIS domains
      • 3.3.9. The ypserv daemon
      • 3.3.10. The ypbind daemon
      • 3.3.11. NIS server as an NIS client
    • 3.4. Trace of a key match
  • 4. System Management Using NIS
    • 4.1. NIS network design
      • 4.1.1. Dividing a network into domains
      • 4.1.2. Domain names
      • 4.1.3. Number of NIS servers per domain
    • 4.2. Managing map files
      • 4.2.1. Map distribution
      • 4.2.2. Regular map transfers
      • 4.2.3. Map file dependencies
      • 4.2.4. Password file updates
      • 4.2.5. Source code control for map files
      • 4.2.6. Using alternate map source files
    • 4.3. Advanced NIS server administration
      • 4.3.1. Removing an NIS slave server
      • 4.3.2. Changing NIS master servers
    • 4.4. Managing multiple domains
  • 5. Living with Multiple Directory Servers
    • 5.1. Domain name servers
      • 5.1.1. DNS versus NIS
      • 5.1.2. DNS integration with NIS
      • 5.1.3. NIS and DNS domain names
      • 5.1.4. Domain aliases
    • 5.2. Implementation
      • 5.2.1. Run NIS without DNS on client and server
      • 5.2.2. Run NIS on client, enable DNS on NIS server
      • 5.2.3. Run DNS on NIS clients and servers
      • 5.2.4. Run NIS on client, enable DNS on NIS client
    • 5.3. Fully qualified and unqualified hostnames
    • 5.4. Centralized versus distributed management
    • 5.5. Migrating from NIS to DNS for host naming
    • 5.6. What next?
  • 6. System Administration Using the Network File System
    • 6.1. Setting up NFS
    • 6.2. Exporting filesystems
      • 6.2.1. Rules for exporting filesystems
      • 6.2.2. Exporting options
    • 6.3. Mounting filesystems
      • 6.3.1. Using /etc/vfstab
      • 6.3.2. Using mount
      • 6.3.3. Mount options
      • 6.3.4. Backgrounding mounts
      • 6.3.5. Hard and soft mounts
      • 6.3.6. Resolving mount problems
    • 6.4. Symbolic links
      • 6.4.1. Resolving symbolic links in NFS
      • 6.4.2. Absolute and relative pathnames
      • 6.4.3. Mount points, exports, and links
    • 6.5. Replication
      • 6.5.1. Properties of replicas
      • 6.5.2. Rules for mounting replicas
      • 6.5.3. Managing replicas
      • 6.5.4. Replicas and the automounter
    • 6.6. Naming schemes
      • 6.6.1. Solving the /usr/local puzzle
  • 7. Network File System Design and Operation
    • 7.1. Virtual filesystems and virtual nodes
    • 7.2. NFS protocol and implementation
      • 7.2.1. NFS RPC procedures
      • 7.2.2. Statelessness and crash recovery
      • 7.2.3. Request retransmission
      • 7.2.4. Preserving Unix filesystem semantics
      • 7.2.5. Pathnames and filehandles
      • 7.2.6. NFS Version 3
      • 7.2.7. NFS over TCP
    • 7.3. NFS components
      • 7.3.1. nfsd and NFS server threads
      • 7.3.2. Client I/O system
      • 7.3.3. NFS kernel code
    • 7.4. Caching
      • 7.4.1. File attribute caching
      • 7.4.2. Client data caching
      • 7.4.3. Server-side caching
    • 7.5. File locking
      • 7.5.1. Lock and status daemons
      • 7.5.2. Client lock recovery
      • 7.5.3. Recreating state information
    • 7.6. NFS futures
      • 7.6.1. NFS Version 4
      • 7.6.2. Security
  • 8. Diskless Clients
    • 8.1. NFS support for diskless clients
    • 8.2. Setting up a diskless client
    • 8.3. Diskless client boot process
      • 8.3.1. Reverse ARP requests
      • 8.3.2. Getting a boot block
      • 8.3.3. Booting a kernel
      • 8.3.4. Managing boot parameters
    • 8.4. Managing client swap space
    • 8.5. Changing a client's name
    • 8.6. Troubleshooting
      • 8.6.1. Missing and inconsistent client information
      • 8.6.2. Checking boot parameters
      • 8.6.3. Debugging rarpd and bootparamd
      • 8.6.4. Missing /usr
    • 8.7. Configuration options
      • 8.7.1. Dataless clients
      • 8.7.2. Swapping on a local disk
    • 8.8. Brief introduction to JumpStart administration
    • 8.9. Client/server ratios
  • 9. The Automounter
    • 9.1. Automounter maps
      • 9.1.1. Indirect maps
      • 9.1.2. Inside the automounter
      • 9.1.3. Direct maps
    • 9.2. Invocation and the master map
      • 9.2.1. The master map
      • 9.2.2. Command-line options
      • 9.2.3. The null map
      • 9.2.4. Tuning timeout values
    • 9.3. Integration with NIS
      • 9.3.1. Mixing NIS and files in the same map
      • 9.3.2. Updating NIS-managed automount maps
    • 9.4. Key and variable substitutions
      • 9.4.1. Key substitutions
      • 9.4.2. Variable substitutions
    • 9.5. Advanced map tricks
      • 9.5.1. Replicated servers
      • 9.5.2. Hierarchical mounts
      • 9.5.3. Conversion of direct maps
      • 9.5.4. Multiple indirection
      • 9.5.5. Executable indirect maps
    • 9.6. Side effects
      • 9.6.1. Long search paths
      • 9.6.2. Avoiding automounted filesystems
  • 10. PC/NFS Clients
    • 10.1. PC/NFS today
    • 10.2. Limitations of PC/NFS
      • 10.2.1. NFS versus SMB (CIFS)
      • 10.2.2. Why PC/NFS?
    • 10.3. Configuring PC/NFS
      • 10.3.1. Server-side PC/NFS configuration
    • 10.4. Common PC/NFS usage issues
      • 10.4.1. Mounting filesystems
      • 10.4.2. Checking file permissions
      • 10.4.3. Unix to Windows/NT text file conversion
    • 10.5. Printer services
  • 11. File Locking
    • 11.1. What is file locking?
      • 11.1.1. Exclusive and shared locks
      • 11.1.2. Record locks
      • 11.1.3. Mandatory versus advisory locking
      • 11.1.4. Windows/NT locking scheme
    • 11.2. NFS and file locking
      • 11.2.1. The NLM protocol
      • 11.2.2. NLM recovery
      • 11.2.3. Mandatory locking and NFS
      • 11.2.4. NFS and Windows lock semantics
    • 11.3. Troubleshooting locking problems
      • 11.3.1. Diagnosing NFS lock hangs
      • 11.3.2. Examining lock state on NFS/NLM servers
      • 11.3.3. Clearing lock state
  • 12. Network Security
    • 12.1. User-oriented network security
      • 12.1.1. Trusted hosts and trusted users
      • 12.1.2. Enabling transparent access
      • 12.1.3. Using netgroups
    • 12.2. How secure are NIS and NFS?
    • 12.3. Password and NIS security
      • 12.3.1. Managing the root password with NIS
      • 12.3.2. Making NIS more secure
      • 12.3.3. Unknown password entries
    • 12.4. NFS security
      • 12.4.1. RPC security
      • 12.4.2. Superuser mapping
      • 12.4.3. Unknown user mapping
      • 12.4.4. Access to filesystems
      • 12.4.5. Read-only access
      • 12.4.6. Port monitoring
      • 12.4.7. Using NFS through firewalls
      • 12.4.8. Access control lists
    • 12.5. Stronger security for NFS
      • 12.5.1. Security services
      • 12.5.2. Brief introduction to cryptography
      • 12.5.3. NFS and IPSec
      • 12.5.4. AUTH_DH: Diffie-Hellman authentication
      • 12.5.5. RPCSEC_GSS: Generic security services for RPC
      • 12.5.6. Planning a transition from NFS/sys to stronger NFS security
      • 12.5.7. NFS security futures
    • 12.6. Viruses
  • 13. Network Diagnostic and Administrative Tools
    • 13.1. Broadcast addresses
    • 13.2. MAC and IP layer tools
      • 13.2.1. ifconfig: interface configuration
      • 13.2.2. Subnetwork masks
      • 13.2.3. IP to MAC address mappings
      • 13.2.4. Using ping to check network connectivity
      • 13.2.5. Gauging Ethernet interface capacity
    • 13.3. Remote procedure call tools
      • 13.3.1. RPC mechanics
      • 13.3.2. RPC registration
      • 13.3.3. Debugging RPC problems
    • 13.4. NIS tools
      • 13.4.1. Key lookup
      • 13.4.2. Displaying and analyzing client bindings
      • 13.4.3. Other NIS map information
      • 13.4.4. Setting initial client bindings
      • 13.4.5. Modifying client bindings
    • 13.5. Network analyzers
      • 13.5.1. snoop
      • 13.5.2. ethereal / tethereal
      • 13.5.3. Capture filters
      • 13.5.4. Read filters
  • 14. NFS Diagnostic Tools
    • 14.1. NFS administration tools
    • 14.2. NFS statistics
      • 14.2.1. I/O statistics
    • 14.3. snoop
      • 14.3.1. Useful filters
    • 14.4. Publicly available diagnostics
      • 14.4.1. ethereal / tethereal
      • 14.4.2. Useful filters
      • 14.4.3. NFSWATCH
      • 14.4.4. nfsbug
      • 14.4.5. SATAN
    • 14.5. Version 2 and Version 3 differences
    • 14.6. NFS server logging
      • 14.6.1. NFS server logging mechanics
      • 14.6.2. Enabling NFS server logging
      • 14.6.3. NFS server logging configuration
      • 14.6.4. The nfslogd daemon
      • 14.6.5. Filehandle to path mapping
      • 14.6.6. NFS log cycling
      • 14.6.7. Manipulating NFS log files
      • 14.6.8. Other configuration parameters
      • 14.6.9. Disabling NFS server logging
    • 14.7. Time synchronization
  • 15. Debugging Network Problems
    • 15.1. Duplicate ARP replies
    • 15.2. Renegade NIS server
    • 15.3. Boot parameter confusion
    • 15.4. Incorrect directory content caching
    • 15.5. Incorrect mount point permissions
    • 15.6. Asynchronous NFS error messages
  • 16. Server-Side Performance Tuning
    • 16.1. Characterization of NFS behavior
    • 16.2. Measuring performance
    • 16.3. Benchmarking
    • 16.4. Identifying NFS performance bottlenecks
      • 16.4.1. Problem areas
      • 16.4.2. Throughput
      • 16.4.3. Locating bottlenecks
    • 16.5. Server tuning
      • 16.5.1. CPU loading
      • 16.5.2. NFS server threads
      • 16.5.3. Memory usage
      • 16.5.4. Disk and filesystem throughput
      • 16.5.5. Kernel configuration
      • 16.5.6. Cross-mounting filesystems
      • 16.5.7. Multihomed servers
  • 17. Network Performance Analysis
    • 17.1. Network congestion and network interfaces
      • 17.1.1. Local network interface
      • 17.1.2. Collisions and network saturation
    • 17.2. Network partitioning hardware
    • 17.3. Network infrastructure
      • 17.3.1. Switched networks
      • 17.3.2. ATM and FDDI networks
    • 17.4. Impact of partitioning
      • 17.4.1. NIS in a partitioned network
      • 17.4.2. Effects on diskless nodes
    • 17.5. Protocol filtering
  • 18. Client-Side Performance Tuning
    • 18.1. Slow server compensation
      • 18.1.1. Identifying NFS retransmissions
      • 18.1.2. Timeout period calculation
      • 18.1.3. Retransmission rate thresholds
      • 18.1.4. NFS over TCP is your friend
    • 18.2. Soft mount issues
    • 18.3. Adjusting for network reliability problems
    • 18.4. NFS over wide-area networks
    • 18.5. NFS async thread tuning
    • 18.6. Attribute caching
    • 18.7. Mount point constructions
    • 18.8. Stale filehandles
  • A. IP Packet Routing
    • A.1. Routers and their routing tables
    • A.2. Static routing
  • B. NFS Problem Diagnosis
    • B.1. NFS server problems
    • B.2. NFS client problems
    • B.3. NFS errno values
  • C. Tunable Parameters
暂无相关搜索结果!
    展开/收起文章目录

    二维码

    手机扫一扫,轻松掌上学

    《Managing NFS and NIS, 2nd Editi - Mike Eisler; Ricardo Labiaga; H》电子书下载

    请下载您需要的格式的电子书,随时随地,享受学习的乐趣!
    EPUB 电子书

    书签列表

      阅读记录

      阅读进度: 0.00% ( 0/0 ) 重置阅读进度