Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Preface
Who this book is for Versions Organization Conventions used in this book Differences between the first edition and second edition Comments and questions Hal's acknowledgments from the first edition Acknowledgments for the second edition
Hal Stern's acknowledgments Mike Eisler's acknowledgments Ricardo Labiaga's acknowledgments
1. Networking Fundamentals
1.1. Networking overview 1.2. Physical and data link layers
1.2.1. Frames and network interfaces 1.2.2. Ethernet addresses
1.3. Network layer
1.3.1. Datagrams and packets 1.3.2. IP host addresses 1.3.3. IPv4 address classes 1.3.4. Classless IP addressing 1.3.5. Virtual interfaces 1.3.6. IP Version 6
1.4. Transport layer
1.4.1. TCP and UDP 1.4.2. Port numbers
1.5. The session and presentation layers
1.5.1. The client-server model 1.5.2. External data representation 1.5.3. Internet and RPC server configuration
2. Introduction to Directory Services
2.1. Purpose of directory services
2.1.1. The hosts database
2.2. Brief survey of common directory services
2.2.1. Directory Name Service (DNS) 2.2.2. Network Information Service (NIS) 2.2.3. NIS+ 2.2.4. X.500 2.2.5. Lightweight Directory Access Protocol (LDAP) 2.2.6. NT Domain
2.3. Name service switch 2.4. Which directory service to use
3. Network Information Service Operation
3.1. Masters, slaves, and clients 3.2. Basics of NIS management
3.2.1. Choosing NIS servers 3.2.2. Installing the NIS master server 3.2.3. Installing NIS slave servers 3.2.4. Enabling NIS on client hosts
3.3. Files managed under NIS
3.3.1. Working with the maps 3.3.2. Netgroups 3.3.3. Hostname formats in netgroups 3.3.4. Integrating NIS maps with local files 3.3.5. Map files 3.3.6. Map naming 3.3.7. Map structure 3.3.8. NIS domains 3.3.9. The ypserv daemon 3.3.10. The ypbind daemon 3.3.11. NIS server as an NIS client
3.4. Trace of a key match
4. System Management Using NIS
4.1. NIS network design
4.1.1. Dividing a network into domains 4.1.2. Domain names 4.1.3. Number of NIS servers per domain
4.2. Managing map files
4.2.1. Map distribution 4.2.2. Regular map transfers 4.2.3. Map file dependencies 4.2.4. Password file updates 4.2.5. Source code control for map files 4.2.6. Using alternate map source files
4.3. Advanced NIS server administration
4.3.1. Removing an NIS slave server 4.3.2. Changing NIS master servers
4.4. Managing multiple domains
5. Living with Multiple Directory Servers
5.1. Domain name servers
5.1.1. DNS versus NIS 5.1.2. DNS integration with NIS 5.1.3. NIS and DNS domain names 5.1.4. Domain aliases
5.2. Implementation
5.2.1. Run NIS without DNS on client and server 5.2.2. Run NIS on client, enable DNS on NIS server 5.2.3. Run DNS on NIS clients and servers 5.2.4. Run NIS on client, enable DNS on NIS client
5.3. Fully qualified and unqualified hostnames 5.4. Centralized versus distributed management 5.5. Migrating from NIS to DNS for host naming 5.6. What next?
6. System Administration Using the Network File System
6.1. Setting up NFS 6.2. Exporting filesystems
6.2.1. Rules for exporting filesystems 6.2.2. Exporting options
6.3. Mounting filesystems
6.3.1. Using /etc/vfstab 6.3.2. Using mount 6.3.3. Mount options 6.3.4. Backgrounding mounts 6.3.5. Hard and soft mounts 6.3.6. Resolving mount problems
6.4. Symbolic links
6.4.1. Resolving symbolic links in NFS 6.4.2. Absolute and relative pathnames 6.4.3. Mount points, exports, and links
6.5. Replication
6.5.1. Properties of replicas 6.5.2. Rules for mounting replicas 6.5.3. Managing replicas 6.5.4. Replicas and the automounter
6.6. Naming schemes
6.6.1. Solving the /usr/local puzzle
7. Network File System Design and Operation
7.1. Virtual filesystems and virtual nodes 7.2. NFS protocol and implementation
7.2.1. NFS RPC procedures 7.2.2. Statelessness and crash recovery 7.2.3. Request retransmission 7.2.4. Preserving Unix filesystem semantics 7.2.5. Pathnames and filehandles 7.2.6. NFS Version 3 7.2.7. NFS over TCP
7.3. NFS components
7.3.1. nfsd and NFS server threads 7.3.2. Client I/O system 7.3.3. NFS kernel code
7.4. Caching
7.4.1. File attribute caching 7.4.2. Client data caching 7.4.3. Server-side caching
7.5. File locking
7.5.1. Lock and status daemons 7.5.2. Client lock recovery 7.5.3. Recreating state information
7.6. NFS futures
7.6.1. NFS Version 4 7.6.2. Security
8. Diskless Clients
8.1. NFS support for diskless clients 8.2. Setting up a diskless client 8.3. Diskless client boot process
8.3.1. Reverse ARP requests 8.3.2. Getting a boot block 8.3.3. Booting a kernel 8.3.4. Managing boot parameters
8.4. Managing client swap space 8.5. Changing a client's name 8.6. Troubleshooting
8.6.1. Missing and inconsistent client information 8.6.2. Checking boot parameters 8.6.3. Debugging rarpd and bootparamd 8.6.4. Missing /usr
8.7. Configuration options
8.7.1. Dataless clients 8.7.2. Swapping on a local disk
8.8. Brief introduction to JumpStart administration 8.9. Client/server ratios
9. The Automounter
9.1. Automounter maps
9.1.1. Indirect maps 9.1.2. Inside the automounter 9.1.3. Direct maps
9.2. Invocation and the master map
9.2.1. The master map 9.2.2. Command-line options 9.2.3. The null map 9.2.4. Tuning timeout values
9.3. Integration with NIS
9.3.1. Mixing NIS and files in the same map 9.3.2. Updating NIS-managed automount maps
9.4. Key and variable substitutions
9.4.1. Key substitutions 9.4.2. Variable substitutions
9.5. Advanced map tricks
9.5.1. Replicated servers 9.5.2. Hierarchical mounts 9.5.3. Conversion of direct maps 9.5.4. Multiple indirection 9.5.5. Executable indirect maps
9.6. Side effects
9.6.1. Long search paths 9.6.2. Avoiding automounted filesystems
10. PC/NFS Clients
10.1. PC/NFS today 10.2. Limitations of PC/NFS
10.2.1. NFS versus SMB (CIFS) 10.2.2. Why PC/NFS?
10.3. Configuring PC/NFS
10.3.1. Server-side PC/NFS configuration
10.4. Common PC/NFS usage issues
10.4.1. Mounting filesystems 10.4.2. Checking file permissions 10.4.3. Unix to Windows/NT text file conversion
10.5. Printer services
11. File Locking
11.1. What is file locking?
11.1.1. Exclusive and shared locks 11.1.2. Record locks 11.1.3. Mandatory versus advisory locking 11.1.4. Windows/NT locking scheme
11.2. NFS and file locking
11.2.1. The NLM protocol 11.2.2. NLM recovery 11.2.3. Mandatory locking and NFS 11.2.4. NFS and Windows lock semantics
11.3. Troubleshooting locking problems
11.3.1. Diagnosing NFS lock hangs 11.3.2. Examining lock state on NFS/NLM servers 11.3.3. Clearing lock state
12. Network Security
12.1. User-oriented network security
12.1.1. Trusted hosts and trusted users 12.1.2. Enabling transparent access 12.1.3. Using netgroups
12.2. How secure are NIS and NFS? 12.3. Password and NIS security
12.3.1. Managing the root password with NIS 12.3.2. Making NIS more secure 12.3.3. Unknown password entries
12.4. NFS security
12.4.1. RPC security 12.4.2. Superuser mapping 12.4.3. Unknown user mapping 12.4.4. Access to filesystems 12.4.5. Read-only access 12.4.6. Port monitoring 12.4.7. Using NFS through firewalls 12.4.8. Access control lists
12.5. Stronger security for NFS
12.5.1. Security services 12.5.2. Brief introduction to cryptography 12.5.3. NFS and IPSec 12.5.4. AUTH_DH: Diffie-Hellman authentication 12.5.5. RPCSEC_GSS: Generic security services for RPC 12.5.6. Planning a transition from NFS/sys to stronger NFS security 12.5.7. NFS security futures
12.6. Viruses
13. Network Diagnostic and Administrative Tools
13.1. Broadcast addresses 13.2. MAC and IP layer tools
13.2.1. ifconfig: interface configuration 13.2.2. Subnetwork masks 13.2.3. IP to MAC address mappings 13.2.4. Using ping to check network connectivity 13.2.5. Gauging Ethernet interface capacity
13.3. Remote procedure call tools
13.3.1. RPC mechanics 13.3.2. RPC registration 13.3.3. Debugging RPC problems
13.4. NIS tools
13.4.1. Key lookup 13.4.2. Displaying and analyzing client bindings 13.4.3. Other NIS map information 13.4.4. Setting initial client bindings 13.4.5. Modifying client bindings
13.5. Network analyzers
13.5.1. snoop 13.5.2. ethereal / tethereal 13.5.3. Capture filters 13.5.4. Read filters
14. NFS Diagnostic Tools
14.1. NFS administration tools 14.2. NFS statistics
14.2.1. I/O statistics
14.3. snoop
14.3.1. Useful filters
14.4. Publicly available diagnostics
14.4.1. ethereal / tethereal 14.4.2. Useful filters 14.4.3. NFSWATCH 14.4.4. nfsbug 14.4.5. SATAN
14.5. Version 2 and Version 3 differences 14.6. NFS server logging
14.6.1. NFS server logging mechanics 14.6.2. Enabling NFS server logging 14.6.3. NFS server logging configuration 14.6.4. The nfslogd daemon 14.6.5. Filehandle to path mapping 14.6.6. NFS log cycling 14.6.7. Manipulating NFS log files 14.6.8. Other configuration parameters 14.6.9. Disabling NFS server logging
14.7. Time synchronization
15. Debugging Network Problems
15.1. Duplicate ARP replies 15.2. Renegade NIS server 15.3. Boot parameter confusion 15.4. Incorrect directory content caching 15.5. Incorrect mount point permissions 15.6. Asynchronous NFS error messages
16. Server-Side Performance Tuning
16.1. Characterization of NFS behavior 16.2. Measuring performance 16.3. Benchmarking 16.4. Identifying NFS performance bottlenecks
16.4.1. Problem areas 16.4.2. Throughput 16.4.3. Locating bottlenecks
16.5. Server tuning
16.5.1. CPU loading 16.5.2. NFS server threads 16.5.3. Memory usage 16.5.4. Disk and filesystem throughput 16.5.5. Kernel configuration 16.5.6. Cross-mounting filesystems 16.5.7. Multihomed servers
17. Network Performance Analysis
17.1. Network congestion and network interfaces
17.1.1. Local network interface 17.1.2. Collisions and network saturation
17.2. Network partitioning hardware 17.3. Network infrastructure
17.3.1. Switched networks 17.3.2. ATM and FDDI networks
17.4. Impact of partitioning
17.4.1. NIS in a partitioned network 17.4.2. Effects on diskless nodes
17.5. Protocol filtering
18. Client-Side Performance Tuning
18.1. Slow server compensation
18.1.1. Identifying NFS retransmissions 18.1.2. Timeout period calculation 18.1.3. Retransmission rate thresholds 18.1.4. NFS over TCP is your friend
18.2. Soft mount issues 18.3. Adjusting for network reliability problems 18.4. NFS over wide-area networks 18.5. NFS async thread tuning 18.6. Attribute caching 18.7. Mount point constructions 18.8. Stale filehandles
A. IP Packet Routing
A.1. Routers and their routing tables A.2. Static routing
B. NFS Problem Diagnosis
B.1. NFS server problems B.2. NFS client problems B.3. NFS errno values
C. Tunable Parameters
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion