diff --git a/LDP/guide/docbook/Linux-Networking/Layering.xml b/LDP/guide/docbook/Linux-Networking/Layering.xml index f20a39aa..707bf6e0 100644 --- a/LDP/guide/docbook/Linux-Networking/Layering.xml +++ b/LDP/guide/docbook/Linux-Networking/Layering.xml @@ -4,7 +4,7 @@ Using a virtual machine concept, each layer of a network stack -is a virtual machine, with layer one being the real machine and +is a virtual machine, with layer one being the physical machine and the top layer providing the highest level functionality or the functions that are most abstracted from the physical world. The top layer is directly interpreted by human beings. The bottom layer @@ -15,27 +15,27 @@ beings. In a layered model, entities forming the corresponding layers on different -machines are called peers and protocols forms a central part of network +machines are called peers and protocols form a central part of network software. The layered approach to networks and general software engineering -principles adopted add to the structure of network software. Each layer -performs a small set of well defined functions (services) required by the +principles adopted add to the structure of network software with each layer +performing a small set of well defined functions (services) required by the layer above it. -The layered approach offers a communication setting where layer n on one -machine can have a conversation with layer n on the other mahine. Layer +This layered approach offers a communication setting where layer n on one +machine can have a conversation with layer n on another machine. Layer n-protocol is essentially a set of rules and conventions facilitating this conversation. This includes addressing and specification of necessary DU's (Data Units). -You should note that this communication between layers is virtual. There is -no physical or direct communication between layers of two layer-n hosts. The -actual communication takes place at the lowest layer (usually called the -physical layer). The conglomeration of layers and corresponding layer -protocols form a network architecture. +You should note that the communication between layers is virtual. There is +no physical or direct communication taking place between layers of two +layer-n hosts. The actual communication takes place at the lowest layer +(usually called the physical layer). The conglomeration of layers and +corresponding layer protocols form a network architecture/network stack. @@ -46,47 +46,50 @@ well as a checksum. -This leads us to the problem of addressing. In order for computers to communicate properly -it was generally agreed by Ethernet card manufacturers that all NIC cards would possess a -48 bit unique address. This is called a MAC address but is often called the hardware address -of these cards. This aids portability and modularity of LAN (Local Area Network) technology and -software to a major extent. The data units here are called as frames. This is all you need -really to have a small network. +This leads us to the problem of addressing. In order for computers to +communicate properly it was generally agreed by Ethernet card manufacturers +that all NIC cards would possess a 48 bit unique address. This is called a +MAC address but is often called the hardware address of these cards. This +aids portability and modularity of LAN (Local Area Network) technology and +software to a major extent. The data units here are called as frames. This +is all you need really to have a small network. -However, there exists a fundamental problem if you were to extend this idea to larger systems -(ie. greater than 100 nodes). It is extremely difficult to keep track of and maintain such a -network due to administrators having to keep track of the name of each and every system and -deciding what the name of new computers on the network will be. +However, there exists a fundamental problem if you were to extend this idea +to larger systems (ie. greater than 100 nodes). It is extremely difficult to +keep track of and maintain such a network due to administrators having to keep +track of the name of each and every system and deciding what the name of new +computers on the network will be. -For this reason, the idea of hostnames and network addresses were developed. For example, -on the LAN a computer may be called "computer" but on the internet it may be referred to -as "computer.network.com". The idea behind network addressing came to be known simply now -as IP (Internet Prococol) addressing. +For this reason, the idea of hostnames and network addresses were developed. +For example, on the LAN a computer may be called "computer" but on the internet +it may be referred to as "computer.network.com". The idea behind network +addressing came to be known simply now as IP (Internet Prococol) addressing. -You could say that the idea behind computer network addressing is roughly synonymous with that -of the rather mundane telephone network. To call a number in your region all you have to do -is dial that number. To call a number in another state you must add a number of other digits -to the start of the number. To call a number that is overseas you must add further digits -to the beginning of the now burgeoning number. The only difference between telephone and -network addressing is that you add numbers to the front rather than at the end of the address. +You could say that the idea behind computer network addressing is roughly +synonymous with that of the rather mundane telephone network. To call a number +in your region all you have to do is dial that number. To call a number in another +state you must add a number of other digits to the start of the number. To call a +number that is overseas you must add further digits to the beginning of the now +burgeoning number. The only difference between telephone and network addressing is +that you add numbers to the front rather than at the end of the address. -To this day, it has been found that by utilising so called layer architecture for networks, -suitable protocols and appropriate communication technologies the issues of network -application interfacing, network addressing and network functionality can be addressed -successfully. +To this day, it has been found that by utilising so called layer architecture for +networks, suitable protocols and appropriate communication technologies the issues +of network application interfacing, network addressing and network functionality +can be addressed successfully. -There are eight main network technology issues that must be addressed at each layer in the -architecture though. These are outlined below: +There are eight main network technology issues that must be addressed at each layer +in the architecture though. These are outlined below: 1. Mechanism of identifying senders and receivers: addressing. @@ -103,11 +106,12 @@ To study the above issues in detail please consult, Tannenbaum 4th edition. -These design issues become recurring themes that are usually addressed by each and every -layer in the architecture. As a stark example, although error detection and correction is -undertaken by the low level transmission protocol that sends characters from a terminal -to the display, the user will also implement error detection and correction at the highest -level by deleting an incorrect character and retyping. +These design issues become recurring themes that are usually addressed by +each and every layer in the architecture. As a stark example, although error +detection and correction is undertaken by the low level transmission protocol +that sends characters from a terminal to the display, the user will also +implement error detection and correction at the highest level by deleting an +incorrect character and retyping. diff --git a/LDP/guide/docbook/Linux-Networking/Media-Types.xml b/LDP/guide/docbook/Linux-Networking/Media-Types.xml index 51887703..2c2efae1 100644 --- a/LDP/guide/docbook/Linux-Networking/Media-Types.xml +++ b/LDP/guide/docbook/Linux-Networking/Media-Types.xml @@ -2,23 +2,47 @@ Media-Types - - Media Types -Common network media include twisted pair (UTP and STP), coaxial cable, fiber-optic cable, and wireless transmissions via infrared and radio waves. Network media are usually chosen based on several criteria: their cost, their vulnerability to EMI and eavesdropping, their bandwidth, and the maximum distance at which they can be used. + +Common network media include twisted pair (UTP and STP), coaxial cable, +fiber-optic cable, and wireless transmissions via infrared and radio waves. +Network media are usually chosen based on several criteria: their cost, +their vulnerability to EMI and eavesdropping, their bandwidth, and the +maximum distance at which they can be used. + Twisted Pair Ethernet Cable Unshielded Twisted Pair (UTP) -UTP is the most common type of network cable in use today. UTP consits of one or more pairs of insulated copper wires. The wires are twisted together to reduce crosstalk, and enclosed in a plastic insulator. UTP is the type of cable used in telephone systems. + +UTP is the most common type of network cable in use today. UTP consits of +one or more pairs of insulated copper wires. The wires are twisted together +to reduce crosstalk, and enclosed in a plastic insulator. UTP is the type of +cable used in telephone systems. + -UTP cables are generally wires using RJ-45 jacks and plugs. These are 8-conductor connectors similar to the RJ-11 connectors used in telephone cables. UTP is inexpensive and easy to install compared with other types of cable, although the differenet types of UTP vary in cost. + +UTP cables are generally wires using RJ-45 jacks and plugs. These are +8-conductor connectors similar to the RJ-11 connectors used in telephone +cables. UTP is inexpensive and easy to install compared with other types of +cable, although the differenet types of UTP vary in cost. + -Copper wire has a high level of attenuation. YTP cable is limited to transmission distances of 100 meters or less. UTP is more susceptible to interference (EMI) than mos types of cable, and is vaulnerable to eavesdropping since its own emissions are not shielded. + +Copper wire has a high level of attenuation. YTP cable is limited to +transmission distances of 100 meters or less. UTP is more susceptible +to interference (EMI) than mos types of cable, and is vaulnerable to +eavesdropping since its own emissions are not shielded. + -Types of UTP cable are defined by the EIA standards, which specify the three categories of cable. Category 3 is the minimum requiredment for networking, and Category 5 is the highest-quality network cable. The UTP categories and the bandwidth they support are summarized below. + +Types of UTP cable are defined by the EIA standards, which specify the three +categories of cable. Category 3 is the minimum requiredment for networking, +and Category 5 is the highest-quality network cable. The UTP categories and +the bandwidth they support are summarized below. + Category Maximum Data and Transfer Rate Description 3 10 Mbps Least expensive network cable, commonly used @@ -31,70 +55,165 @@ Category Maximum Data and Transfer Rate Description Shielded Twisted Pair (STP) -STP cable is similar to UTP, but inclues a foil or wire mesh shield between the wire pairs and the outer insulation. The shield is electrically grounded, and reduces emissions and susceptibility to EMI. STP cable is used in some Token Ting and AppleTalk networks. STP is more expensive than -UTP, and its thickness and rigidity make it more difficult to install. It also uses grounded connection connectors, adding to the expense. STP uses the same copper wires as UTP as the same level of attenuation, and therefore the same maximum distance of about 100 meters. However, it is much less susceptible to EMI and eavesdropping. The reduced inteference allows for higher bandwidth, potentially as high as 500 Mbps. + +STP cable is similar to UTP, but inclues a foil or wire mesh shield +between the wire pairs and the outer insulation. The shield is electrically +grounded, and reduces emissions and susceptibility to EMI. STP cable is used +in some Token Ting and AppleTalk networks. STP is more expensive than +UTP, and its thickness and rigidity make it more difficult to install. It +also uses grounded connection connectors, adding to the expense. STP uses +the same copper wires as UTP as the same level of attenuation, and therefore +the same maximum distance of about 100 meters. However, it is much less +susceptible to EMI and eavesdropping. The reduced inteference allows for higher +bandwidth, potentially as high as 500 Mbps. + Coaxial -Coaxial Cable consists of a single thick copper wire surrounded by an insulator. A shield surrounding the insulator is used as the second conductor, and is encased in an outer insulation. One type of coaxial cable is that used for cable television. The shielding cable makes coaxial cable less susceptible to EMI and emissions than UTP. The cable used in most nteworks is either Thick Ethernet (RG-8) or Thin Ethernet (RG-58). Thin coaxial cable is less expensive than the highest quality (Category 5) UTP, but is more difficult to install due to its thickness, its lack of flexibility, the connectors (you should keep the length of cable between the `T piece' and the actual ethernet card in the PC as short as possible, ideally the `T piece' will be plugged directly into the ethernet card), and the neccesity for terminators (a terminator is a 52 ohm resistor that helps to ensure that the signal is absorbed and not reflected when it reaches the end of the cable. Without a terminator at each end of the cabling you may find that the ethernet is unreliable or doesn't work at all). + +Coaxial Cable consists of a single thick copper wire surrounded by an +insulator. A shield surrounding the insulator is used as the second conductor, +and is encased in an outer insulation. One type of coaxial cable is that used +for cable television. The shielding cable makes coaxial cable less susceptible +to EMI and emissions than UTP. The cable used in most nteworks is either +Thick Ethernet (RG-8) or Thin Ethernet (RG-58). Thin coaxial cable is less +expensive than the highest quality (Category 5) UTP, but is more difficult to +install due to its thickness, its lack of flexibility, the connectors (you +should keep the length of cable between the `T piece' and the actual ethernet +card in the PC as short as possible, ideally the `T piece' will be plugged +directly into the ethernet card), and the neccesity for terminators (a +terminator is a 52 ohm resistor that helps to ensure that the signal is +absorbed and not reflected when it reaches the end of the cable. Without a +terminator at each end of the cabling you may find that the ethernet is +unreliable or doesn't work at all). + -The generally available types of coaxial cable are described in the table below. + +The most commonly available types of coaxial cable are described in the table +below. + + + Type Impendance Common Cable RG-8 50 ohms Thick Ethernet (thicknet) RG-11 50 ohms Thick Ethernet (thicknet) RG-58 50 ohms Thin Ethernet (thinnet) RG-59 75 ohms Cable TV RG-62 93 ohms ARCnet + + Fiber Optic -A fiber optic cable consists of a thin glass or clear plastic fiber encased in a protective jacket. Signals are sent through the cable in form of light. There are two types of fiber optic cable: single-mode, which uses a single wavelength, and multimode, which uses multiple multiple wavelengths in the same cable. Fiber optic cable is completely invulnerable to EMI, and has no detectable emissions. However, it and its associated equipment are expensive compared to other types of cable, and the most difficult to install. Single-mode cable is much more expensive than multimode cable. The advantages of fiber are high bandwidth (up to 2 Gbps (gigabits per second) and extremely low attenuation. Fiber cable can reach distances ranging from severak miles for multimode cable to hundreds of miles for single-mode cable. + +A fiber optic cable consists of a thin glass or clear plastic fiber encased +in a protective jacket. Signals are sent through the cable in form of light. +There are two types of fiber optic cable: single-mode, which uses a single +wavelength, and multimode, which uses multiple multiple wavelengths in the +same cable. Fiber optic cable is completely invulnerable to EMI, and has no +detectable emissions. However, it and its associated equipment are expensive +compared to other types of cable, and the most difficult to install. Single-mode +cable is much more expensive than multimode cable. The advantages of fiber are +high bandwidth (up to 2 Gbps (gigabits per second) and extremely low attenuation. +Fiber cable can reach distances ranging from severak miles for multimode cable +to hundreds of miles for single-mode cable. Infrared -Wireless infrared networking systems are modulated beams of infrared light to transmit data. These types of networks require a line of sight, and are generally used for short distances such as networks within buildings or between nearby buildings. Infrared communications are not subject to EMI, but are vulnerable to obstructions (such as weather conditions) and bright light, and suseceptible to eavesdropping. There are two types of infrared networks: + +Wireless infrared networking systems are modulated beams of infrared light to +transmit data. These types of networks require a line of sight, and are +generally used for short distances such as networks within buildings or between +nearby buildings. Infrared communications are not subject to EMI, but are +vulnerable to obstructions (such as weather conditions) and bright light, and +suseceptible to eavesdropping. There are two types of infrared networks: + -- Point-to-point networks use a focused beam, usually generated by a laser. They are less vulnerable to dispersion and can theorectically be used for long distance networking, although the need for precise alignment between receiever and transmitter and the vulneraibility to obstructions often makes it impractical. Bandwidth can be as high as 16 Mbps. +- Point-to-point networks use a focused beam, usually generated by a laser. +They are less vulnerable to dispersion and can theorectically be used for long +distance networking, although the need for precise alignment between receiever +and transmitter and the vulneraibility to obstructions often makes it +impractical. Bandwidth can be as high as 16 Mbps. -- Broadcast networks use a less focused beam that disperses rapidly. These systems can transmit to multiple workstations ar once, but are much more vulnerable to dispersion, limiting their useful distance and bandwidth. Bandwidth is usually no more than 1 Mbps. +- Broadcast networks use a less focused beam that disperses rapidly. These +systems can transmit to multiple workstations ar once, but are much more +vulnerable to dispersion, limiting their useful distance and bandwidth. +Bandwidth is usually no more than 1 Mbps. Radio -The most common type of wireless networks use radio waves. Tdaio-based networks have a reasonably high bandwidth, but are very sensitve to EMI and eavesdropping. Also, many radio frequencies are regulated by the FCC and are unavailable for use without a license. There are three types of radio links: + +The most common type of wireless networks use radio waves. Tdaio-based networks +have a reasonably high bandwidth, but are very sensitve to EMI and eavesdropping. +Also, many radio frequencies are regulated by the FCC and are unavailable for use +without a license. There are three types of radio links: + - Low power single frequency -This type of system is best suited for small ares, such as within a building. It uses a lower-power transmitter on a single radio frequency. The available range is approximately 30 meters. This is the lowest-cost method of radio networking. Bandwidth may be as high as 10 Mbps. +This type of system is best suited for small ares, such as within a building. It +uses a lower-power transmitter on a single radio frequency. The available range is +approximately 30 meters. This is the lowest-cost method of radio networking. +Bandwidth may be as high as 10 Mbps. - High power single frequency -This system is also uses a single frequency, but at a higher power. This allows for a much greater range, often covering an entire metropolitan area. Bandwidth is typically 10 Mbps. The greater range makes this type of network the most vulnerable to eavesdropping. +This system is also uses a single frequency, but at a higher power. This allows +for a much greater range, often covering an entire metropolitan area. Bandwidth is +typically 10 Mbps. The greater range makes this type of network the most vulnerable +to eavesdropping. - Spread-spectrum -These systems use multiple frequencies, primarily to avoid eavesdropping. This is done in two ways, direct sequence modulation sends packets sequentially over several different frequencies, while frequency hopping transmission change frequencies at scheduled intervals known to both ends. Both of these are significantly less vulnerable less vulnerable to EMI and snooping than other radio networks. +These systems use multiple frequencies, primarily to avoid eavesdropping. This +is done in two ways, direct sequence modulation sends packets sequentially over +several different frequencies, while frequency hopping transmission change +frequencies at scheduled intervals known to both ends. Both of these are +significantly less vulnerable less vulnerable to EMI and snooping than other +radio networks. Microwave -Another type of wireless network communications uses microwaves, which are similar to radio waves but at a higher frequency. Higher frequencies are less vulnerable to interference and snooping, and can provide greater bandwidth. Two common types of microwave networks are in use: + +Another type of wireless network communications uses microwaves, which are +similar to radio waves but at a higher frequency. Higher frequencies are less +vulnerable to interference and snooping, and can provide greater bandwidth. +Two common types of microwave networks are in use: + - Terrestial -This method provides for line-of-sight communication, usually across a short distance. -Bandwidth can be as high as 10 Mbps. Microwaves are still vulnerable to interference and -eavesropping, although not as much as conventional radio waves. +This method provides for line-of-sight communication, usually across a short +distance. Bandwidth can be as high as 10 Mbps. Microwaves are still vulnerable +to interference and eavesropping, although not as much as conventional radio +waves. - Satellite -This method relays microwave transmissions via a satellite, allowing for a nearly global -range. The bandwidth can be as high as 10 Mbps, but the satellite relays cause delays that -may impair real-time communication. These systems are more expensive than wireless -communication. +This method relays microwave transmissions via a satellite, allowing for a +nearly global range. The bandwidth can be as high as 10 Mbps, but the satellite +relays cause delays that may impair real-time communication. These systems are +more expensive than wireless communication. + + + +Please note that any information after this point in this section is largely +redundant as these technologies have been superceded (from the perspective of +being economically more viable and also technologically superior) by +those that have been outlined above. + Serial NULL Modem cable -Not all NULL modem cables are alike. Many null modem cables do little more than trick your computer into thinking all the appropriate signals are present and swap transmit and receive data. This is ok but means that you must use software flow control (XON/XOFF) which is less efficient than hardware flow control. The following cable provides the best possible signalling between machines and allows you to use hardware (RTS/CTS) flow control. + +Not all NULL modem cables are alike. Many null modem cables do little more +than trick your computer into thinking all the appropriate signals are present +and swap transmit and receive data. This is ok but means that you must use +software flow control (XON/XOFF) which is less efficient than hardware flow +control. The following cable provides the best possible signalling between +machines and allows you to use hardware (RTS/CTS) flow control. + @@ -114,7 +233,9 @@ Not all NULL modem cables are alike. Many null modem cables do little more than Parallel port cable (PLIP cable) -If you intend to use the PLIP protocol between two machines then this cable will work for you irrespective of what sort of parallel ports you have installed. +If you intend to use the PLIP protocol between two machines then this +cable will work for you irrespective of what sort of parallel ports you +have installed. @@ -149,11 +270,20 @@ Notes: connected to the metallic DB-25 shell at one end only. -Warning: A miswired PLIP cable can destroy your controller card. Be very careful and double check every connection to ensure you don't cause yourself any unnecessary work or heartache. +Warning: A miswired PLIP cable can destroy your controller card. Be very +careful and double check every connection to ensure you don't cause yourself +any unnecessary work or heartache. -While you may be able to run PLIP cables for long distances, you should avoid it if you can. The specifications for the cable allow for a cable length of about 1 metre or so. Please be very careful when running long plip cables as sources of strong electromagnetic fields such as lightning, power lines and radio transmitters can interfere with and sometimes even damage your controller. If you really want to connect two of your computers over a large distance you really should be looking at alternatives such as obtaining a pair of thin-net ethernet cards and running some coaxial cable. +While you may be able to run PLIP cables for long distances, you should avoid +it if you can. The specifications for the cable allow for a cable length of +about 1 metre or so. Please be very careful when running long plip cables as +sources of strong electromagnetic fields such as lightning, power lines and +radio transmitters can interfere with and sometimes even damage your controller. +If you really want to connect two of your computers over a large distance you +really should be looking at alternatives such as obtaining a pair of thin-net +ethernet cards and running some coaxial cable. diff --git a/LDP/guide/docbook/Linux-Networking/Sources.xml b/LDP/guide/docbook/Linux-Networking/Sources.xml index f36e41b0..55d70070 100644 --- a/LDP/guide/docbook/Linux-Networking/Sources.xml +++ b/LDP/guide/docbook/Linux-Networking/Sources.xml @@ -272,94 +272,94 @@ -Michael Moncur, MSCE The Core Exams in a Nutshell, O'Reilly & Associates, 1998, USA +Michael Moncur, MSCE The Core Exams in a Nutshell, O'Reilly &apm; Associates, 1998, USA Ashton Mills, The Advanced Linux Pocketbook, ACP Tech, 2001, Australia Guido ``goccia'' Gonzato, Configuration HOWTO, www.tldp.org, Version 1.99.7. 6 November 2001. Ian Ward, Debian and Windows Shared Printing mini-HOWTO, www.tldp.org, Revision 1.4 2004-01-05 -> Configuration HOWTO -> Debian and Windows Shared Printing mini-HOWTO -> Check Debian and Windows Shared Printing mini-HOWTO -> DHCP mini-HOWTO is SERIOUSLY dodgy and needs an update -> Root over nfs clients & server Howto., REALLY COOL doc contains stuff about TFTP and networking configuration -> Root over NFS - Another Approach, same as above except updated -> Divert Sockets mini-HOWTO, watch, stop and modify IP packets as they pass up and down the stack -> DNS HOWTO -> IPv6 HOWTO -> Linux + XFS HOWTO -> Linux Complete Backup and Recovery HOWTO -> Linux Crash HOWTO -> The Mock Mainframe Mini-HOWTO -> Linux NCD mini-HOWTO, up to scratch???? -> NCD X terminal mini HOWTO -> Linux Netstation HOWTO -> Network Boot and Exotic Root HOWTO -> The Linux Networking Overview HOWTO -> Linux NFS-HOWTO -> NFS-Root mini-HOWTO -> NFS-Root-Client Mini-HOWTO -> The Linux NIS(YP)/NYS/NIS+ HOWTO -> Linux Optimized Link State Routing Protocol (OLSR) IPv6 HOWTO -> Online Troubleshooting Resources : HOWTO (very very good) -> The openMosix HOWTO -> LINUX PLIP MINI-HOWTO -> PLIP Install HOWTO -> Plug-and-Play-HOWTO -> Linux PPP HOWTO -> VPN PPP-SSH Mini-HOWTO -> The Printing HOWTO -> The Linux Printing Usage HOWTO -> ProxyARP Subnetting HOWTO -> Linux web browser station (formerly "The Linux Public Web Browser mini-HOWTO") -> mini-HOWTO install qmail with MH (2 versions) -> Linux Remote-Boot mini-HOWTO: Configuring Remote-Boot Workstations with Linux, DOS, Windows 95/98 and Windows NT -> Remote Bridging with IP Tunnels mini-HOWTO -> Remote Serial Console HOWTO -> Remote X Apps mini-HOWTO -> Root RAID HOWTO cookbook, deprecated!!!! -> Samba Authenticated Gateway HOWTO -> Sat (Satellite Technology) HOWTO -> The Linux 2.4 SCSI subsystem HOWTO -> The Linux SCSI Generic (sg) HOWTO -> The Linux SCSI programming HOWTO, deprecated!!!! -> Secure CVS Pserver Mini-HOWTO -> Secure POP via SSH mini-HOWTO -> Text-Terminal-HOWTO -> Thin Client: New User Guide -> Managing Accurate Date and Time -> Transparent Proxy with Linux and Squid mini-HOWTO -> The Unix and Internet Fundamentals HOWTO -> The Unix Hardware Buyer HOWTO -> UPS HOWTO -> Usenet News HOWTO -> User Authentication HOWTO -> The Linux UUCP HOWTO -> Linux VAR HOWTO, information on linux consulting -> VideoLAN HOWTO -> VoIP Howto -> The VPN HOWTO, deprecated!!!! -> VPN HOWTO -> Linux VPN Masquerade HOWTO -> Web Browsing Behind ISA Server HOWTO -> Windows LAN server HOW-TO -> Wireless Howto -> Link-sys WPC11 Mini-HOWTO -> Wireless Sync HOWTO (Using jpilot to sync your PalmOS device to your desktop across a wireless (802.11b) network.) -> Linux XDMCP HOWTO -> XDM and X Terminal mini-HOWTO -> The Linux XFree86 HOWTO -> ATI R200 + XFree86 4.x mini-HOWTO -> Second Mouse in X mini-HOWTO -> Linux Touch Screen HOWTO -> XFree86 Video Timings HOWTO -> Linux XFree-to-Xinside mini-HOWTO -> XFree Local Multi-User HOWTO -> Using Xinerama to MultiHead XFree86 V. 4.0+ -> XML-RPC HOWTO -> Connecting X Terminals to Linux Mini-HOWTO -> How to change the title of an xterm -> X Window System Architecture Overview HOWTO -> The X Window User HOWTO +Configuration HOWTO +Debian and Windows Shared Printing mini-HOWTO +Check Debian and Windows Shared Printing mini-HOWTO +DHCP mini-HOWTO is SERIOUSLY dodgy and needs an update +Root over nfs clients & server Howto., REALLY COOL doc contains stuff about TFTP and networking configuration +Root over NFS - Another Approach, same as above except updated +Divert Sockets mini-HOWTO, watch, stop and modify IP packets as they pass up and down the stack +DNS HOWTO +IPv6 HOWTO +Linux + XFS HOWTO +Linux Complete Backup and Recovery HOWTO +Linux Crash HOWTO +The Mock Mainframe Mini-HOWTO +Linux NCD mini-HOWTO, up to scratch???? +NCD X terminal mini HOWTO +Linux Netstation HOWTO +Network Boot and Exotic Root HOWTO +The Linux Networking Overview HOWTO +Linux NFS-HOWTO +NFS-Root mini-HOWTO +NFS-Root-Client Mini-HOWTO +The Linux NIS(YP)/NYS/NIS+ HOWTO +Linux Optimized Link State Routing Protocol (OLSR) IPv6 HOWTO +Online Troubleshooting Resources : HOWTO (very very good) +The openMosix HOWTO +LINUX PLIP MINI-HOWTO +PLIP Install HOWTO +Plug-and-Play-HOWTO +Linux PPP HOWTO +VPN PPP-SSH Mini-HOWTO +The Printing HOWTO +The Linux Printing Usage HOWTO +ProxyARP Subnetting HOWTO +Linux web browser station (formerly "The Linux Public Web Browser mini-HOWTO") +mini-HOWTO install qmail with MH (2 versions) +Linux Remote-Boot mini-HOWTO: Configuring Remote-Boot Workstations with Linux, DOS, Windows 95/98 and Windows NT +Remote Bridging with IP Tunnels mini-HOWTO +Remote Serial Console HOWTO +Remote X Apps mini-HOWTO +Root RAID HOWTO cookbook, deprecated!!!! +Samba Authenticated Gateway HOWTO +Sat (Satellite Technology) HOWTO +The Linux 2.4 SCSI subsystem HOWTO +The Linux SCSI Generic (sg) HOWTO +The Linux SCSI programming HOWTO, deprecated!!!! +Secure CVS Pserver Mini-HOWTO +Secure POP via SSH mini-HOWTO +Text-Terminal-HOWTO +Thin Client: New User Guide +Managing Accurate Date and Time +Transparent Proxy with Linux and Squid mini-HOWTO +The Unix and Internet Fundamentals HOWTO +The Unix Hardware Buyer HOWTO +UPS HOWTO +Usenet News HOWTO +User Authentication HOWTO +The Linux UUCP HOWTO +Linux VAR HOWTO, information on linux consulting +VideoLAN HOWTO +VoIP Howto +The VPN HOWTO, deprecated!!!! +VPN HOWTO +Linux VPN Masquerade HOWTO +Web Browsing Behind ISA Server HOWTO +Windows LAN server HOW-TO +Wireless Howto +Link-sys WPC11 Mini-HOWTO +Wireless Sync HOWTO (Using jpilot to sync your PalmOS device to your desktop across a wireless (802.11b) network.) +Linux XDMCP HOWTO +XDM and X Terminal mini-HOWTO +The Linux XFree86 HOWTO +ATI R200 + XFree86 4.x mini-HOWTO +Second Mouse in X mini-HOWTO +Linux Touch Screen HOWTO +XFree86 Video Timings HOWTO +Linux XFree-to-Xinside mini-HOWTO +XFree Local Multi-User HOWTO +Using Xinerama to MultiHead XFree86 V. 4.0+ +XML-RPC HOWTO +Connecting X Terminals to Linux Mini-HOWTO +How to change the title of an xterm +X Window System Architecture Overview HOWTO +The X Window User HOWTO Bandwidth Limiting HOWTO www.webopedia.com/quick_ref/OSI_Layers.asp