×
思维导图备注
Managing NFS and NIS, 2nd Editi - Mike Eisler; Ricardo Labiaga; H
首页
收藏书籍
阅读记录
书签管理
我的书签
添加书签
移除书签
7.4. Caching
浏览
3
扫码
小字体
中字体
大字体
2022-02-24 01:36:20
请
登录
再阅读
上一篇:
下一篇:
Preface
Who this book is for
Versions
Organization
Conventions used in this book
Differences between the first edition and second edition
Comments and questions
Hal's acknowledgments from the first edition
Acknowledgments for the second edition
Hal Stern's acknowledgments
Mike Eisler's acknowledgments
Ricardo Labiaga's acknowledgments
1. Networking Fundamentals
1.1. Networking overview
1.2. Physical and data link layers
1.2.1. Frames and network interfaces
1.2.2. Ethernet addresses
1.3. Network layer
1.3.1. Datagrams and packets
1.3.2. IP host addresses
1.3.3. IPv4 address classes
1.3.4. Classless IP addressing
1.3.5. Virtual interfaces
1.3.6. IP Version 6
1.4. Transport layer
1.4.1. TCP and UDP
1.4.2. Port numbers
1.5. The session and presentation layers
1.5.1. The client-server model
1.5.2. External data representation
1.5.3. Internet and RPC server configuration
2. Introduction to Directory Services
2.1. Purpose of directory services
2.1.1. The hosts database
2.2. Brief survey of common directory services
2.2.1. Directory Name Service (DNS)
2.2.2. Network Information Service (NIS)
2.2.3. NIS+
2.2.4. X.500
2.2.5. Lightweight Directory Access Protocol (LDAP)
2.2.6. NT Domain
2.3. Name service switch
2.4. Which directory service to use
3. Network Information Service Operation
3.1. Masters, slaves, and clients
3.2. Basics of NIS management
3.2.1. Choosing NIS servers
3.2.2. Installing the NIS master server
3.2.3. Installing NIS slave servers
3.2.4. Enabling NIS on client hosts
3.3. Files managed under NIS
3.3.1. Working with the maps
3.3.2. Netgroups
3.3.3. Hostname formats in netgroups
3.3.4. Integrating NIS maps with local files
3.3.5. Map files
3.3.6. Map naming
3.3.7. Map structure
3.3.8. NIS domains
3.3.9. The ypserv daemon
3.3.10. The ypbind daemon
3.3.11. NIS server as an NIS client
3.4. Trace of a key match
4. System Management Using NIS
4.1. NIS network design
4.1.1. Dividing a network into domains
4.1.2. Domain names
4.1.3. Number of NIS servers per domain
4.2. Managing map files
4.2.1. Map distribution
4.2.2. Regular map transfers
4.2.3. Map file dependencies
4.2.4. Password file updates
4.2.5. Source code control for map files
4.2.6. Using alternate map source files
4.3. Advanced NIS server administration
4.3.1. Removing an NIS slave server
4.3.2. Changing NIS master servers
4.4. Managing multiple domains
5. Living with Multiple Directory Servers
5.1. Domain name servers
5.1.1. DNS versus NIS
5.1.2. DNS integration with NIS
5.1.3. NIS and DNS domain names
5.1.4. Domain aliases
5.2. Implementation
5.2.1. Run NIS without DNS on client and server
5.2.2. Run NIS on client, enable DNS on NIS server
5.2.3. Run DNS on NIS clients and servers
5.2.4. Run NIS on client, enable DNS on NIS client
5.3. Fully qualified and unqualified hostnames
5.4. Centralized versus distributed management
5.5. Migrating from NIS to DNS for host naming
5.6. What next?
6. System Administration Using the Network File System
6.1. Setting up NFS
6.2. Exporting filesystems
6.2.1. Rules for exporting filesystems
6.2.2. Exporting options
6.3. Mounting filesystems
6.3.1. Using /etc/vfstab
6.3.2. Using mount
6.3.3. Mount options
6.3.4. Backgrounding mounts
6.3.5. Hard and soft mounts
6.3.6. Resolving mount problems
6.4. Symbolic links
6.4.1. Resolving symbolic links in NFS
6.4.2. Absolute and relative pathnames
6.4.3. Mount points, exports, and links
6.5. Replication
6.5.1. Properties of replicas
6.5.2. Rules for mounting replicas
6.5.3. Managing replicas
6.5.4. Replicas and the automounter
6.6. Naming schemes
6.6.1. Solving the /usr/local puzzle
7. Network File System Design and Operation
7.1. Virtual filesystems and virtual nodes
7.2. NFS protocol and implementation
7.2.1. NFS RPC procedures
7.2.2. Statelessness and crash recovery
7.2.3. Request retransmission
7.2.4. Preserving Unix filesystem semantics
7.2.5. Pathnames and filehandles
7.2.6. NFS Version 3
7.2.7. NFS over TCP
7.3. NFS components
7.3.1. nfsd and NFS server threads
7.3.2. Client I/O system
7.3.3. NFS kernel code
7.4. Caching
7.4.1. File attribute caching
7.4.2. Client data caching
7.4.3. Server-side caching
7.5. File locking
7.5.1. Lock and status daemons
7.5.2. Client lock recovery
7.5.3. Recreating state information
7.6. NFS futures
7.6.1. NFS Version 4
7.6.2. Security
8. Diskless Clients
8.1. NFS support for diskless clients
8.2. Setting up a diskless client
8.3. Diskless client boot process
8.3.1. Reverse ARP requests
8.3.2. Getting a boot block
8.3.3. Booting a kernel
8.3.4. Managing boot parameters
8.4. Managing client swap space
8.5. Changing a client's name
8.6. Troubleshooting
8.6.1. Missing and inconsistent client information
8.6.2. Checking boot parameters
8.6.3. Debugging rarpd and bootparamd
8.6.4. Missing /usr
8.7. Configuration options
8.7.1. Dataless clients
8.7.2. Swapping on a local disk
8.8. Brief introduction to JumpStart administration
8.9. Client/server ratios
9. The Automounter
9.1. Automounter maps
9.1.1. Indirect maps
9.1.2. Inside the automounter
9.1.3. Direct maps
9.2. Invocation and the master map
9.2.1. The master map
9.2.2. Command-line options
9.2.3. The null map
9.2.4. Tuning timeout values
9.3. Integration with NIS
9.3.1. Mixing NIS and files in the same map
9.3.2. Updating NIS-managed automount maps
9.4. Key and variable substitutions
9.4.1. Key substitutions
9.4.2. Variable substitutions
9.5. Advanced map tricks
9.5.1. Replicated servers
9.5.2. Hierarchical mounts
9.5.3. Conversion of direct maps
9.5.4. Multiple indirection
9.5.5. Executable indirect maps
9.6. Side effects
9.6.1. Long search paths
9.6.2. Avoiding automounted filesystems
10. PC/NFS Clients
10.1. PC/NFS today
10.2. Limitations of PC/NFS
10.2.1. NFS versus SMB (CIFS)
10.2.2. Why PC/NFS?
10.3. Configuring PC/NFS
10.3.1. Server-side PC/NFS configuration
10.4. Common PC/NFS usage issues
10.4.1. Mounting filesystems
10.4.2. Checking file permissions
10.4.3. Unix to Windows/NT text file conversion
10.5. Printer services
11. File Locking
11.1. What is file locking?
11.1.1. Exclusive and shared locks
11.1.2. Record locks
11.1.3. Mandatory versus advisory locking
11.1.4. Windows/NT locking scheme
11.2. NFS and file locking
11.2.1. The NLM protocol
11.2.2. NLM recovery
11.2.3. Mandatory locking and NFS
11.2.4. NFS and Windows lock semantics
11.3. Troubleshooting locking problems
11.3.1. Diagnosing NFS lock hangs
11.3.2. Examining lock state on NFS/NLM servers
11.3.3. Clearing lock state
12. Network Security
12.1. User-oriented network security
12.1.1. Trusted hosts and trusted users
12.1.2. Enabling transparent access
12.1.3. Using netgroups
12.2. How secure are NIS and NFS?
12.3. Password and NIS security
12.3.1. Managing the root password with NIS
12.3.2. Making NIS more secure
12.3.3. Unknown password entries
12.4. NFS security
12.4.1. RPC security
12.4.2. Superuser mapping
12.4.3. Unknown user mapping
12.4.4. Access to filesystems
12.4.5. Read-only access
12.4.6. Port monitoring
12.4.7. Using NFS through firewalls
12.4.8. Access control lists
12.5. Stronger security for NFS
12.5.1. Security services
12.5.2. Brief introduction to cryptography
12.5.3. NFS and IPSec
12.5.4. AUTH_DH: Diffie-Hellman authentication
12.5.5. RPCSEC_GSS: Generic security services for RPC
12.5.6. Planning a transition from NFS/sys to stronger NFS security
12.5.7. NFS security futures
12.6. Viruses
13. Network Diagnostic and Administrative Tools
13.1. Broadcast addresses
13.2. MAC and IP layer tools
13.2.1. ifconfig: interface configuration
13.2.2. Subnetwork masks
13.2.3. IP to MAC address mappings
13.2.4. Using ping to check network connectivity
13.2.5. Gauging Ethernet interface capacity
13.3. Remote procedure call tools
13.3.1. RPC mechanics
13.3.2. RPC registration
13.3.3. Debugging RPC problems
13.4. NIS tools
13.4.1. Key lookup
13.4.2. Displaying and analyzing client bindings
13.4.3. Other NIS map information
13.4.4. Setting initial client bindings
13.4.5. Modifying client bindings
13.5. Network analyzers
13.5.1. snoop
13.5.2. ethereal / tethereal
13.5.3. Capture filters
13.5.4. Read filters
14. NFS Diagnostic Tools
14.1. NFS administration tools
14.2. NFS statistics
14.2.1. I/O statistics
14.3. snoop
14.3.1. Useful filters
14.4. Publicly available diagnostics
14.4.1. ethereal / tethereal
14.4.2. Useful filters
14.4.3. NFSWATCH
14.4.4. nfsbug
14.4.5. SATAN
14.5. Version 2 and Version 3 differences
14.6. NFS server logging
14.6.1. NFS server logging mechanics
14.6.2. Enabling NFS server logging
14.6.3. NFS server logging configuration
14.6.4. The nfslogd daemon
14.6.5. Filehandle to path mapping
14.6.6. NFS log cycling
14.6.7. Manipulating NFS log files
14.6.8. Other configuration parameters
14.6.9. Disabling NFS server logging
14.7. Time synchronization
15. Debugging Network Problems
15.1. Duplicate ARP replies
15.2. Renegade NIS server
15.3. Boot parameter confusion
15.4. Incorrect directory content caching
15.5. Incorrect mount point permissions
15.6. Asynchronous NFS error messages
16. Server-Side Performance Tuning
16.1. Characterization of NFS behavior
16.2. Measuring performance
16.3. Benchmarking
16.4. Identifying NFS performance bottlenecks
16.4.1. Problem areas
16.4.2. Throughput
16.4.3. Locating bottlenecks
16.5. Server tuning
16.5.1. CPU loading
16.5.2. NFS server threads
16.5.3. Memory usage
16.5.4. Disk and filesystem throughput
16.5.5. Kernel configuration
16.5.6. Cross-mounting filesystems
16.5.7. Multihomed servers
17. Network Performance Analysis
17.1. Network congestion and network interfaces
17.1.1. Local network interface
17.1.2. Collisions and network saturation
17.2. Network partitioning hardware
17.3. Network infrastructure
17.3.1. Switched networks
17.3.2. ATM and FDDI networks
17.4. Impact of partitioning
17.4.1. NIS in a partitioned network
17.4.2. Effects on diskless nodes
17.5. Protocol filtering
18. Client-Side Performance Tuning
18.1. Slow server compensation
18.1.1. Identifying NFS retransmissions
18.1.2. Timeout period calculation
18.1.3. Retransmission rate thresholds
18.1.4. NFS over TCP is your friend
18.2. Soft mount issues
18.3. Adjusting for network reliability problems
18.4. NFS over wide-area networks
18.5. NFS async thread tuning
18.6. Attribute caching
18.7. Mount point constructions
18.8. Stale filehandles
A. IP Packet Routing
A.1. Routers and their routing tables
A.2. Static routing
B. NFS Problem Diagnosis
B.1. NFS server problems
B.2. NFS client problems
B.3. NFS errno values
C. Tunable Parameters
暂无相关搜索结果!
×
二维码
手机扫一扫,轻松掌上学
×
《Managing NFS and NIS, 2nd Editi - Mike Eisler; Ricardo Labiaga; H》电子书下载
请下载您需要的格式的电子书,随时随地,享受学习的乐趣!
EPUB 电子书
×
书签列表
×
阅读记录
阅读进度:
0.00%
(
0/0
)
重置阅读进度