More consolidation.

Binh.
This commit is contained in:
binh 2005-02-17 15:36:30 +00:00
parent a2c1a51103
commit 82294ef4d6
3 changed files with 291 additions and 157 deletions

View File

@ -4,7 +4,7 @@
<para>
Using a virtual machine concept, each layer of a network stack
is a virtual machine, with layer one being the real machine and
is a virtual machine, with layer one being the physical machine and
the top layer providing the highest level functionality or the
functions that are most abstracted from the physical world. The
top layer is directly interpreted by human beings. The bottom layer
@ -15,27 +15,27 @@ beings.
<para>
In a layered model, entities forming the corresponding layers on different
machines are called peers and protocols forms a central part of network
machines are called peers and protocols form a central part of network
software. The layered approach to networks and general software engineering
principles adopted add to the structure of network software. Each layer
performs a small set of well defined functions (services) required by the
principles adopted add to the structure of network software with each layer
performing a small set of well defined functions (services) required by the
layer above it.
</para>
<para>
The layered approach offers a communication setting where layer n on one
machine can have a conversation with layer n on the other mahine. Layer
This layered approach offers a communication setting where layer n on one
machine can have a conversation with layer n on another machine. Layer
n-protocol is essentially a set of rules and conventions facilitating
this conversation. This includes addressing and specification of necessary
DU's (Data Units).
</para>
<para>
You should note that this communication between layers is virtual. There is
no physical or direct communication between layers of two layer-n hosts. The
actual communication takes place at the lowest layer (usually called the
physical layer). The conglomeration of layers and corresponding layer
protocols form a network architecture.
You should note that the communication between layers is virtual. There is
no physical or direct communication taking place between layers of two
layer-n hosts. The actual communication takes place at the lowest layer
(usually called the physical layer). The conglomeration of layers and
corresponding layer protocols form a network architecture/network stack.
</para>
<para>
@ -46,47 +46,50 @@ well as a checksum.
</para>
<para>
This leads us to the problem of addressing. In order for computers to communicate properly
it was generally agreed by Ethernet card manufacturers that all NIC cards would possess a
48 bit unique address. This is called a MAC address but is often called the hardware address
of these cards. This aids portability and modularity of LAN (Local Area Network) technology and
software to a major extent. The data units here are called as frames. This is all you need
really to have a small network.
This leads us to the problem of addressing. In order for computers to
communicate properly it was generally agreed by Ethernet card manufacturers
that all NIC cards would possess a 48 bit unique address. This is called a
MAC address but is often called the hardware address of these cards. This
aids portability and modularity of LAN (Local Area Network) technology and
software to a major extent. The data units here are called as frames. This
is all you need really to have a small network.
</para>
<para>
However, there exists a fundamental problem if you were to extend this idea to larger systems
(ie. greater than 100 nodes). It is extremely difficult to keep track of and maintain such a
network due to administrators having to keep track of the name of each and every system and
deciding what the name of new computers on the network will be.
However, there exists a fundamental problem if you were to extend this idea
to larger systems (ie. greater than 100 nodes). It is extremely difficult to
keep track of and maintain such a network due to administrators having to keep
track of the name of each and every system and deciding what the name of new
computers on the network will be.
</para>
<para>
For this reason, the idea of hostnames and network addresses were developed. For example,
on the LAN a computer may be called "computer" but on the internet it may be referred to
as "computer.network.com". The idea behind network addressing came to be known simply now
as IP (Internet Prococol) addressing.
For this reason, the idea of hostnames and network addresses were developed.
For example, on the LAN a computer may be called "computer" but on the internet
it may be referred to as "computer.network.com". The idea behind network
addressing came to be known simply now as IP (Internet Prococol) addressing.
</para>
<para>
You could say that the idea behind computer network addressing is roughly synonymous with that
of the rather mundane telephone network. To call a number in your region all you have to do
is dial that number. To call a number in another state you must add a number of other digits
to the start of the number. To call a number that is overseas you must add further digits
to the beginning of the now burgeoning number. The only difference between telephone and
network addressing is that you add numbers to the front rather than at the end of the address.
You could say that the idea behind computer network addressing is roughly
synonymous with that of the rather mundane telephone network. To call a number
in your region all you have to do is dial that number. To call a number in another
state you must add a number of other digits to the start of the number. To call a
number that is overseas you must add further digits to the beginning of the now
burgeoning number. The only difference between telephone and network addressing is
that you add numbers to the front rather than at the end of the address.
</para>
<para>
To this day, it has been found that by utilising so called layer architecture for networks,
suitable protocols and appropriate communication technologies the issues of network
application interfacing, network addressing and network functionality can be addressed
successfully.
To this day, it has been found that by utilising so called layer architecture for
networks, suitable protocols and appropriate communication technologies the issues
of network application interfacing, network addressing and network functionality
can be addressed successfully.
</para>
<para>
There are eight main network technology issues that must be addressed at each layer in the
architecture though. These are outlined below:
There are eight main network technology issues that must be addressed at each layer
in the architecture though. These are outlined below:
</para>
1. Mechanism of identifying senders and receivers: addressing.
@ -103,11 +106,12 @@ To study the above issues in detail please consult, Tannenbaum 4th edition.
</para>
<para>
These design issues become recurring themes that are usually addressed by each and every
layer in the architecture. As a stark example, although error detection and correction is
undertaken by the low level transmission protocol that sends characters from a terminal
to the display, the user will also implement error detection and correction at the highest
level by deleting an incorrect character and retyping.
These design issues become recurring themes that are usually addressed by
each and every layer in the architecture. As a stark example, although error
detection and correction is undertaken by the low level transmission protocol
that sends characters from a terminal to the display, the user will also
implement error detection and correction at the highest level by deleting an
incorrect character and retyping.
</para>
<para>

View File

@ -2,23 +2,47 @@
<title>Media-Types</title>
<para>
Media Types
Common network media include twisted pair (UTP and STP), coaxial cable, fiber-optic cable, and wireless transmissions via infrared and radio waves. Network media are usually chosen based on several criteria: their cost, their vulnerability to EMI and eavesdropping, their bandwidth, and the maximum distance at which they can be used.
<para>
Common network media include twisted pair (UTP and STP), coaxial cable,
fiber-optic cable, and wireless transmissions via infrared and radio waves.
Network media are usually chosen based on several criteria: their cost,
their vulnerability to EMI and eavesdropping, their bandwidth, and the
maximum distance at which they can be used.
</para>
Twisted Pair Ethernet Cable
Unshielded Twisted Pair (UTP)
UTP is the most common type of network cable in use today. UTP consits of one or more pairs of insulated copper wires. The wires are twisted together to reduce crosstalk, and enclosed in a plastic insulator. UTP is the type of cable used in telephone systems.
<para>
UTP is the most common type of network cable in use today. UTP consits of
one or more pairs of insulated copper wires. The wires are twisted together
to reduce crosstalk, and enclosed in a plastic insulator. UTP is the type of
cable used in telephone systems.
</para>
UTP cables are generally wires using RJ-45 jacks and plugs. These are 8-conductor connectors similar to the RJ-11 connectors used in telephone cables. UTP is inexpensive and easy to install compared with other types of cable, although the differenet types of UTP vary in cost.
<para>
UTP cables are generally wires using RJ-45 jacks and plugs. These are
8-conductor connectors similar to the RJ-11 connectors used in telephone
cables. UTP is inexpensive and easy to install compared with other types of
cable, although the differenet types of UTP vary in cost.
</para>
Copper wire has a high level of attenuation. YTP cable is limited to transmission distances of 100 meters or less. UTP is more susceptible to interference (EMI) than mos types of cable, and is vaulnerable to eavesdropping since its own emissions are not shielded.
<para>
Copper wire has a high level of attenuation. YTP cable is limited to
transmission distances of 100 meters or less. UTP is more susceptible
to interference (EMI) than mos types of cable, and is vaulnerable to
eavesdropping since its own emissions are not shielded.
</para>
Types of UTP cable are defined by the EIA standards, which specify the three categories of cable. Category 3 is the minimum requiredment for networking, and Category 5 is the highest-quality network cable. The UTP categories and the bandwidth they support are summarized below.
<para>
Types of UTP cable are defined by the EIA standards, which specify the three
categories of cable. Category 3 is the minimum requiredment for networking,
and Category 5 is the highest-quality network cable. The UTP categories and
the bandwidth they support are summarized below.
</para>
Category Maximum Data and Transfer Rate Description
3 10 Mbps Least expensive network cable, commonly used
@ -31,70 +55,165 @@ Category Maximum Data and Transfer Rate Description
Shielded Twisted Pair (STP)
STP cable is similar to UTP, but inclues a foil or wire mesh shield between the wire pairs and the outer insulation. The shield is electrically grounded, and reduces emissions and susceptibility to EMI. STP cable is used in some Token Ting and AppleTalk networks. STP is more expensive than
UTP, and its thickness and rigidity make it more difficult to install. It also uses grounded connection connectors, adding to the expense. STP uses the same copper wires as UTP as the same level of attenuation, and therefore the same maximum distance of about 100 meters. However, it is much less susceptible to EMI and eavesdropping. The reduced inteference allows for higher bandwidth, potentially as high as 500 Mbps.
<para>
STP cable is similar to UTP, but inclues a foil or wire mesh shield
between the wire pairs and the outer insulation. The shield is electrically
grounded, and reduces emissions and susceptibility to EMI. STP cable is used
in some Token Ting and AppleTalk networks. STP is more expensive than
UTP, and its thickness and rigidity make it more difficult to install. It
also uses grounded connection connectors, adding to the expense. STP uses
the same copper wires as UTP as the same level of attenuation, and therefore
the same maximum distance of about 100 meters. However, it is much less
susceptible to EMI and eavesdropping. The reduced inteference allows for higher
bandwidth, potentially as high as 500 Mbps.
</para>
Coaxial
Coaxial Cable consists of a single thick copper wire surrounded by an insulator. A shield surrounding the insulator is used as the second conductor, and is encased in an outer insulation. One type of coaxial cable is that used for cable television. The shielding cable makes coaxial cable less susceptible to EMI and emissions than UTP. The cable used in most nteworks is either Thick Ethernet (RG-8) or Thin Ethernet (RG-58). Thin coaxial cable is less expensive than the highest quality (Category 5) UTP, but is more difficult to install due to its thickness, its lack of flexibility, the connectors (you should keep the length of cable between the `T piece' and the actual ethernet card in the PC as short as possible, ideally the `T piece' will be plugged directly into the ethernet card), and the neccesity for terminators (a terminator is a 52 ohm resistor that helps to ensure that the signal is absorbed and not reflected when it reaches the end of the cable. Without a terminator at each end of the cabling you may find that the ethernet is unreliable or doesn't work at all).
<para>
Coaxial Cable consists of a single thick copper wire surrounded by an
insulator. A shield surrounding the insulator is used as the second conductor,
and is encased in an outer insulation. One type of coaxial cable is that used
for cable television. The shielding cable makes coaxial cable less susceptible
to EMI and emissions than UTP. The cable used in most nteworks is either
Thick Ethernet (RG-8) or Thin Ethernet (RG-58). Thin coaxial cable is less
expensive than the highest quality (Category 5) UTP, but is more difficult to
install due to its thickness, its lack of flexibility, the connectors (you
should keep the length of cable between the `T piece' and the actual ethernet
card in the PC as short as possible, ideally the `T piece' will be plugged
directly into the ethernet card), and the neccesity for terminators (a
terminator is a 52 ohm resistor that helps to ensure that the signal is
absorbed and not reflected when it reaches the end of the cable. Without a
terminator at each end of the cabling you may find that the ethernet is
unreliable or doesn't work at all).
</para>
The generally available types of coaxial cable are described in the table below.
<para>
The most commonly available types of coaxial cable are described in the table
below.
</para>
<para>
<screen>
Type Impendance Common Cable
RG-8 50 ohms Thick Ethernet (thicknet)
RG-11 50 ohms Thick Ethernet (thicknet)
RG-58 50 ohms Thin Ethernet (thinnet)
RG-59 75 ohms Cable TV
RG-62 93 ohms ARCnet
</screen>
</para>
Fiber Optic
A fiber optic cable consists of a thin glass or clear plastic fiber encased in a protective jacket. Signals are sent through the cable in form of light. There are two types of fiber optic cable: single-mode, which uses a single wavelength, and multimode, which uses multiple multiple wavelengths in the same cable. Fiber optic cable is completely invulnerable to EMI, and has no detectable emissions. However, it and its associated equipment are expensive compared to other types of cable, and the most difficult to install. Single-mode cable is much more expensive than multimode cable. The advantages of fiber are high bandwidth (up to 2 Gbps (gigabits per second) and extremely low attenuation. Fiber cable can reach distances ranging from severak miles for multimode cable to hundreds of miles for single-mode cable.
<para>
A fiber optic cable consists of a thin glass or clear plastic fiber encased
in a protective jacket. Signals are sent through the cable in form of light.
There are two types of fiber optic cable: single-mode, which uses a single
wavelength, and multimode, which uses multiple multiple wavelengths in the
same cable. Fiber optic cable is completely invulnerable to EMI, and has no
detectable emissions. However, it and its associated equipment are expensive
compared to other types of cable, and the most difficult to install. Single-mode
cable is much more expensive than multimode cable. The advantages of fiber are
high bandwidth (up to 2 Gbps (gigabits per second) and extremely low attenuation.
Fiber cable can reach distances ranging from severak miles for multimode cable
to hundreds of miles for single-mode cable.
Infrared
Wireless infrared networking systems are modulated beams of infrared light to transmit data. These types of networks require a line of sight, and are generally used for short distances such as networks within buildings or between nearby buildings. Infrared communications are not subject to EMI, but are vulnerable to obstructions (such as weather conditions) and bright light, and suseceptible to eavesdropping. There are two types of infrared networks:
<para>
Wireless infrared networking systems are modulated beams of infrared light to
transmit data. These types of networks require a line of sight, and are
generally used for short distances such as networks within buildings or between
nearby buildings. Infrared communications are not subject to EMI, but are
vulnerable to obstructions (such as weather conditions) and bright light, and
suseceptible to eavesdropping. There are two types of infrared networks:
</para>
- Point-to-point networks use a focused beam, usually generated by a laser. They are less vulnerable to dispersion and can theorectically be used for long distance networking, although the need for precise alignment between receiever and transmitter and the vulneraibility to obstructions often makes it impractical. Bandwidth can be as high as 16 Mbps.
- Point-to-point networks use a focused beam, usually generated by a laser.
They are less vulnerable to dispersion and can theorectically be used for long
distance networking, although the need for precise alignment between receiever
and transmitter and the vulneraibility to obstructions often makes it
impractical. Bandwidth can be as high as 16 Mbps.
- Broadcast networks use a less focused beam that disperses rapidly. These systems can transmit to multiple workstations ar once, but are much more vulnerable to dispersion, limiting their useful distance and bandwidth. Bandwidth is usually no more than 1 Mbps.
- Broadcast networks use a less focused beam that disperses rapidly. These
systems can transmit to multiple workstations ar once, but are much more
vulnerable to dispersion, limiting their useful distance and bandwidth.
Bandwidth is usually no more than 1 Mbps.
Radio
The most common type of wireless networks use radio waves. Tdaio-based networks have a reasonably high bandwidth, but are very sensitve to EMI and eavesdropping. Also, many radio frequencies are regulated by the FCC and are unavailable for use without a license. There are three types of radio links:
<para>
The most common type of wireless networks use radio waves. Tdaio-based networks
have a reasonably high bandwidth, but are very sensitve to EMI and eavesdropping.
Also, many radio frequencies are regulated by the FCC and are unavailable for use
without a license. There are three types of radio links:
</para>
- Low power single frequency
This type of system is best suited for small ares, such as within a building. It uses a lower-power transmitter on a single radio frequency. The available range is approximately 30 meters. This is the lowest-cost method of radio networking. Bandwidth may be as high as 10 Mbps.
This type of system is best suited for small ares, such as within a building. It
uses a lower-power transmitter on a single radio frequency. The available range is
approximately 30 meters. This is the lowest-cost method of radio networking.
Bandwidth may be as high as 10 Mbps.
- High power single frequency
This system is also uses a single frequency, but at a higher power. This allows for a much greater range, often covering an entire metropolitan area. Bandwidth is typically 10 Mbps. The greater range makes this type of network the most vulnerable to eavesdropping.
This system is also uses a single frequency, but at a higher power. This allows
for a much greater range, often covering an entire metropolitan area. Bandwidth is
typically 10 Mbps. The greater range makes this type of network the most vulnerable
to eavesdropping.
- Spread-spectrum
These systems use multiple frequencies, primarily to avoid eavesdropping. This is done in two ways, direct sequence modulation sends packets sequentially over several different frequencies, while frequency hopping transmission change frequencies at scheduled intervals known to both ends. Both of these are significantly less vulnerable less vulnerable to EMI and snooping than other radio networks.
These systems use multiple frequencies, primarily to avoid eavesdropping. This
is done in two ways, direct sequence modulation sends packets sequentially over
several different frequencies, while frequency hopping transmission change
frequencies at scheduled intervals known to both ends. Both of these are
significantly less vulnerable less vulnerable to EMI and snooping than other
radio networks.
Microwave
Another type of wireless network communications uses microwaves, which are similar to radio waves but at a higher frequency. Higher frequencies are less vulnerable to interference and snooping, and can provide greater bandwidth. Two common types of microwave networks are in use:
<para>
Another type of wireless network communications uses microwaves, which are
similar to radio waves but at a higher frequency. Higher frequencies are less
vulnerable to interference and snooping, and can provide greater bandwidth.
Two common types of microwave networks are in use:
</para>
- Terrestial
This method provides for line-of-sight communication, usually across a short distance.
Bandwidth can be as high as 10 Mbps. Microwaves are still vulnerable to interference and
eavesropping, although not as much as conventional radio waves.
This method provides for line-of-sight communication, usually across a short
distance. Bandwidth can be as high as 10 Mbps. Microwaves are still vulnerable
to interference and eavesropping, although not as much as conventional radio
waves.
- Satellite
This method relays microwave transmissions via a satellite, allowing for a nearly global
range. The bandwidth can be as high as 10 Mbps, but the satellite relays cause delays that
may impair real-time communication. These systems are more expensive than wireless
communication.
This method relays microwave transmissions via a satellite, allowing for a
nearly global range. The bandwidth can be as high as 10 Mbps, but the satellite
relays cause delays that may impair real-time communication. These systems are
more expensive than wireless communication.
<para>
Please note that any information after this point in this section is largely
redundant as these technologies have been superceded (from the perspective of
being economically more viable and also technologically superior) by
those that have been outlined above.
</para>
Serial NULL Modem cable
Not all NULL modem cables are alike. Many null modem cables do little more than trick your computer into thinking all the appropriate signals are present and swap transmit and receive data. This is ok but means that you must use software flow control (XON/XOFF) which is less efficient than hardware flow control. The following cable provides the best possible signalling between machines and allows you to use hardware (RTS/CTS) flow control.
<para>
Not all NULL modem cables are alike. Many null modem cables do little more
than trick your computer into thinking all the appropriate signals are present
and swap transmit and receive data. This is ok but means that you must use
software flow control (XON/XOFF) which is less efficient than hardware flow
control. The following cable provides the best possible signalling between
machines and allows you to use hardware (RTS/CTS) flow control.
</para>
<para>
<screen>
@ -114,7 +233,9 @@ Not all NULL modem cables are alike. Many null modem cables do little more than
Parallel port cable (PLIP cable)
<para>
If you intend to use the PLIP protocol between two machines then this cable will work for you irrespective of what sort of parallel ports you have installed.
If you intend to use the PLIP protocol between two machines then this
cable will work for you irrespective of what sort of parallel ports you
have installed.
</para>
<para>
@ -149,11 +270,20 @@ Notes:
connected to the metallic DB-25 shell at one end only.
<para>
Warning: A miswired PLIP cable can destroy your controller card. Be very careful and double check every connection to ensure you don't cause yourself any unnecessary work or heartache.
Warning: A miswired PLIP cable can destroy your controller card. Be very
careful and double check every connection to ensure you don't cause yourself
any unnecessary work or heartache.
</para>
<para>
While you may be able to run PLIP cables for long distances, you should avoid it if you can. The specifications for the cable allow for a cable length of about 1 metre or so. Please be very careful when running long plip cables as sources of strong electromagnetic fields such as lightning, power lines and radio transmitters can interfere with and sometimes even damage your controller. If you really want to connect two of your computers over a large distance you really should be looking at alternatives such as obtaining a pair of thin-net ethernet cards and running some coaxial cable.
While you may be able to run PLIP cables for long distances, you should avoid
it if you can. The specifications for the cable allow for a cable length of
about 1 metre or so. Please be very careful when running long plip cables as
sources of strong electromagnetic fields such as lightning, power lines and
radio transmitters can interfere with and sometimes even damage your controller.
If you really want to connect two of your computers over a large distance you
really should be looking at alternatives such as obtaining a pair of thin-net
ethernet cards and running some coaxial cable.
</para>
</sect1>

View File

@ -272,94 +272,94 @@
</listitem>
</itemizedlist>
Michael Moncur, MSCE The Core Exams in a Nutshell, O'Reilly & Associates, 1998, USA
Michael Moncur, MSCE The Core Exams in a Nutshell, O'Reilly &apm; Associates, 1998, USA
Ashton Mills, The Advanced Linux Pocketbook, ACP Tech, 2001, Australia
Guido ``goccia'' Gonzato, Configuration HOWTO, www.tldp.org, Version 1.99.7. 6 November 2001.
Ian Ward, Debian and Windows Shared Printing mini-HOWTO, www.tldp.org, Revision 1.4 2004-01-05
> Configuration HOWTO
> Debian and Windows Shared Printing mini-HOWTO
> Check Debian and Windows Shared Printing mini-HOWTO
> DHCP mini-HOWTO is SERIOUSLY dodgy and needs an update
> Root over nfs clients & server Howto., REALLY COOL doc contains stuff about TFTP and networking configuration
> Root over NFS - Another Approach, same as above except updated
> Divert Sockets mini-HOWTO, watch, stop and modify IP packets as they pass up and down the stack
> DNS HOWTO
> IPv6 HOWTO
> Linux + XFS HOWTO
> Linux Complete Backup and Recovery HOWTO
> Linux Crash HOWTO
> The Mock Mainframe Mini-HOWTO
> Linux NCD mini-HOWTO, up to scratch????
> NCD X terminal mini HOWTO
> Linux Netstation HOWTO
> Network Boot and Exotic Root HOWTO
> The Linux Networking Overview HOWTO
> Linux NFS-HOWTO
> NFS-Root mini-HOWTO
> NFS-Root-Client Mini-HOWTO
> The Linux NIS(YP)/NYS/NIS+ HOWTO
> Linux Optimized Link State Routing Protocol (OLSR) IPv6 HOWTO
> Online Troubleshooting Resources : HOWTO (very very good)
> The openMosix HOWTO
> LINUX PLIP MINI-HOWTO
> PLIP Install HOWTO
> Plug-and-Play-HOWTO
> Linux PPP HOWTO
> VPN PPP-SSH Mini-HOWTO
> The Printing HOWTO
> The Linux Printing Usage HOWTO
> ProxyARP Subnetting HOWTO
> Linux web browser station (formerly "The Linux Public Web Browser mini-HOWTO")
> mini-HOWTO install qmail with MH (2 versions)
> Linux Remote-Boot mini-HOWTO: Configuring Remote-Boot Workstations with Linux, DOS, Windows 95/98 and Windows NT
> Remote Bridging with IP Tunnels mini-HOWTO
> Remote Serial Console HOWTO
> Remote X Apps mini-HOWTO
> Root RAID HOWTO cookbook, deprecated!!!!
> Samba Authenticated Gateway HOWTO
> Sat (Satellite Technology) HOWTO
> The Linux 2.4 SCSI subsystem HOWTO
> The Linux SCSI Generic (sg) HOWTO
> The Linux SCSI programming HOWTO, deprecated!!!!
> Secure CVS Pserver Mini-HOWTO
> Secure POP via SSH mini-HOWTO
> Text-Terminal-HOWTO
> Thin Client: New User Guide
> Managing Accurate Date and Time
> Transparent Proxy with Linux and Squid mini-HOWTO
> The Unix and Internet Fundamentals HOWTO
> The Unix Hardware Buyer HOWTO
> UPS HOWTO
> Usenet News HOWTO
> User Authentication HOWTO
> The Linux UUCP HOWTO
> Linux VAR HOWTO, information on linux consulting
> VideoLAN HOWTO
> VoIP Howto
> The VPN HOWTO, deprecated!!!!
> VPN HOWTO
> Linux VPN Masquerade HOWTO
> Web Browsing Behind ISA Server HOWTO
> Windows LAN server HOW-TO
> Wireless Howto
> Link-sys WPC11 Mini-HOWTO
> Wireless Sync HOWTO (Using jpilot to sync your PalmOS device to your desktop across a wireless (802.11b) network.)
> Linux XDMCP HOWTO
> XDM and X Terminal mini-HOWTO
> The Linux XFree86 HOWTO
> ATI R200 + XFree86 4.x mini-HOWTO
> Second Mouse in X mini-HOWTO
> Linux Touch Screen HOWTO
> XFree86 Video Timings HOWTO
> Linux XFree-to-Xinside mini-HOWTO
> XFree Local Multi-User HOWTO
> Using Xinerama to MultiHead XFree86 V. 4.0+
> XML-RPC HOWTO
> Connecting X Terminals to Linux Mini-HOWTO
> How to change the title of an xterm
> X Window System Architecture Overview HOWTO
> The X Window User HOWTO
Configuration HOWTO
Debian and Windows Shared Printing mini-HOWTO
Check Debian and Windows Shared Printing mini-HOWTO
DHCP mini-HOWTO is SERIOUSLY dodgy and needs an update
Root over nfs clients &amp; server Howto., REALLY COOL doc contains stuff about TFTP and networking configuration
Root over NFS - Another Approach, same as above except updated
Divert Sockets mini-HOWTO, watch, stop and modify IP packets as they pass up and down the stack
DNS HOWTO
IPv6 HOWTO
Linux + XFS HOWTO
Linux Complete Backup and Recovery HOWTO
Linux Crash HOWTO
The Mock Mainframe Mini-HOWTO
Linux NCD mini-HOWTO, up to scratch????
NCD X terminal mini HOWTO
Linux Netstation HOWTO
Network Boot and Exotic Root HOWTO
The Linux Networking Overview HOWTO
Linux NFS-HOWTO
NFS-Root mini-HOWTO
NFS-Root-Client Mini-HOWTO
The Linux NIS(YP)/NYS/NIS+ HOWTO
Linux Optimized Link State Routing Protocol (OLSR) IPv6 HOWTO
Online Troubleshooting Resources : HOWTO (very very good)
The openMosix HOWTO
LINUX PLIP MINI-HOWTO
PLIP Install HOWTO
Plug-and-Play-HOWTO
Linux PPP HOWTO
VPN PPP-SSH Mini-HOWTO
The Printing HOWTO
The Linux Printing Usage HOWTO
ProxyARP Subnetting HOWTO
Linux web browser station (formerly "The Linux Public Web Browser mini-HOWTO")
mini-HOWTO install qmail with MH (2 versions)
Linux Remote-Boot mini-HOWTO: Configuring Remote-Boot Workstations with Linux, DOS, Windows 95/98 and Windows NT
Remote Bridging with IP Tunnels mini-HOWTO
Remote Serial Console HOWTO
Remote X Apps mini-HOWTO
Root RAID HOWTO cookbook, deprecated!!!!
Samba Authenticated Gateway HOWTO
Sat (Satellite Technology) HOWTO
The Linux 2.4 SCSI subsystem HOWTO
The Linux SCSI Generic (sg) HOWTO
The Linux SCSI programming HOWTO, deprecated!!!!
Secure CVS Pserver Mini-HOWTO
Secure POP via SSH mini-HOWTO
Text-Terminal-HOWTO
Thin Client: New User Guide
Managing Accurate Date and Time
Transparent Proxy with Linux and Squid mini-HOWTO
The Unix and Internet Fundamentals HOWTO
The Unix Hardware Buyer HOWTO
UPS HOWTO
Usenet News HOWTO
User Authentication HOWTO
The Linux UUCP HOWTO
Linux VAR HOWTO, information on linux consulting
VideoLAN HOWTO
VoIP Howto
The VPN HOWTO, deprecated!!!!
VPN HOWTO
Linux VPN Masquerade HOWTO
Web Browsing Behind ISA Server HOWTO
Windows LAN server HOW-TO
Wireless Howto
Link-sys WPC11 Mini-HOWTO
Wireless Sync HOWTO (Using jpilot to sync your PalmOS device to your desktop across a wireless (802.11b) network.)
Linux XDMCP HOWTO
XDM and X Terminal mini-HOWTO
The Linux XFree86 HOWTO
ATI R200 + XFree86 4.x mini-HOWTO
Second Mouse in X mini-HOWTO
Linux Touch Screen HOWTO
XFree86 Video Timings HOWTO
Linux XFree-to-Xinside mini-HOWTO
XFree Local Multi-User HOWTO
Using Xinerama to MultiHead XFree86 V. 4.0+
XML-RPC HOWTO
Connecting X Terminals to Linux Mini-HOWTO
How to change the title of an xterm
X Window System Architecture Overview HOWTO
The X Window User HOWTO
Bandwidth Limiting HOWTO
www.webopedia.com/quick_ref/OSI_Layers.asp