Flylib.com
index_V
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
Variable Length Subnet Masks (VLSM)
VLSM (Variable Length Subnet Masks)
VBR
VBRnrt
VBRrt
VCs (virtual circuits)
VDSL (Very-High-Data-Rate Digital Subscriber Line)
virtual addresses
logical addresses 2nd 3rd
virtual circuits:DLCIs:global addresses
global DLCI addresses
universal significance;DLCIs:universal significance
virtual circuits:SVCs:DLCIs
DLCIs
Frame Relay:SVCs:DLCIs;SVCs:DLCIs 2nd
virtual circuits:SVCs:E.164 addressing
DLCIs
Frame Relay:SVCs:E.164 addressing;SVCs:E.164 addressing;E.164 addressing
virtual circuits:SVCs:X.121 addressing
DLCIs
Frame Relay:SVCs:X.121 addressing;SVCs:X.121 addressing;X.121 addressing
viruses
VLANs
VLANs (Virtual LANs)
VLANs:WAN integration
WANs:VLAN integration
VoFr (Voice over Frame Relay)
voice networks:lines
lines
CO:lines;PBX (private branch exchange):lines;lines
voice networks:PSTN:dedicated access
PSTN:dedicated access
dedicated PSTN access
voice networks:PSTN:switched access
PSTN:switched access
switched PSTN access
VPNs:tunneling protocols
tunneling protocols
remote access:VPNs:tunneling protocols
VPNs:tunneling protocols:L2F
tunneling protocols:L2F
remote access:VPNs:L2F;L2F (Layer 2 Forwarding)
VPNs:tunneling protocols:L2TP
tunneling protocols:L2TP
remote access:VPNs:L2TP;L2TP (Layer 2 Tunneling Protocol)
VPNs:tunneling protocols:PPTP
tunneling protocols:PPTP
remote access:VPNs:PPTP;PPTP
VRML (Virtual Reality Modeling Language)
vulnerability to WinNuke attack:testing
WinNuke attack
Previous page
Table of content
Next page
Network Sales and Services Handbook (Cisco Press Networking Technology)
ISBN: 1587050900
EAN: 2147483647
Year: 2005
Pages: 269
Authors:
Matthew J Castelli
BUY ON AMAZON
WebLogic: The Definitive Guide
Using WebLogics JNDI
Domain Backups
JAXP
Accessing MBean Servers
Examples
Java How to Program (6th Edition) (How to Program (Deitel))
History of Java
Wrap-Up
Unmodifiable Collections
Case Study: DeitelMessenger Server and Client
Printing Dates and Times
Competency-Based Human Resource Management
An Overview of Competency-Based HR Management Practices
Competency-Based Employee Recruitment and Selection
The Transformation to Competency-Based HR Management
Competency-Based HR Management The Next Steps
Appendix D Employee Development and Succession Management
An Introduction to Design Patterns in C++ with Qt 4
Points of Departure
Parsing XML
Meta Objects, Properties, and Reflective Programming
Operators
Models and Views: PlayList
DNS & BIND Cookbook
Registering a Reverse-Mapping Domain
Delegating a Subdomain of a Reverse-Mapping Zone
Configuring a Name Server to Accommodate a Slave Running BIND 4
Configuring a BIND Name Server as a Slave to a Microsoft DNS Server
Configuring a Resolver to Append Multiple Domain Names to Arguments
Digital Character Animation 3 (No. 3)
Approaching Design as an Artist
The Language of Movement
Animating Walks
Beyond Walking
Chapter Seven. Facial and Dialogue Animation
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies