Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] D-Link 2nd DAC (Device Access Code) daemons DHCP lpd 2nd network security NFS [See NFS (Network File System).] rpcbind syslog ypserve (NIS) daisy-chains [See also ethernets.] DATA command 2nd Data Encryption Standard (DES) data files, backing up data formatting (IMAP4) Data Link Connection Identifier (DLCI) Data Link Control (DLC) Data Link layer Data Over Cable Service Interface Specification (DOCSIS) data service unit (DSU) Data Terminal (DT) data terminal equipment (DTE) 2nd data transfers databases Active Directory [See Active Directory.] comparing consistency LSDB modifying NIS restoring SAM scavenging searching security X.500 datagrams db (decibels) DCF (Distributed Coordination Function) DDNS (Dynamic DNS) Active Directory implementing DE (Discard Eligibility) decentralized management decibels (db) DECnet 2nd decoding protocols DECT (digital enhanced cordless telecommunications) dedicated connections ATM architecture connections frames LAN emulation service categories frame relay LMI preventing network congestion SVC troubleshooting leased lines Fractional T1 T-carrier system X.25 Dedicated Inquiry Access Code (DIAC) default passwords, changing defining goals DELE command delegation administrative rights LAN network authority OU deleting applications hardware objects printers demilitarized zone (DMZ) 2nd denial of service attacks 2nd Department of Defense (DOD) deploying bus topologies network upgrades upgrades DES (Data Encryption Standard) designs (networks) campus logical components maintaining physical networks planning multi-tiered Destination Service Access Point (DSAP) destinations addresses 2nd IP addresses IPv6 detecting collisions failed logon attempts intrusion development of master plans joining trees master domain model upgrading BDCs PDCs Device Access Code (DAC) devices Bluetooth [See Bluetooth, overview.] BOOTP client/server exchanges (DHCP) DHCP downloading operating systems options fields packet formats request/reply mechanisms communication interference modes NAS networks printing SANs applying NAS Arbitrated Loops fabric switched topology Fibre Channel IP mixed topologies DFS (Distributed File System) DHCP (Dynamic Host Configuration Protocol) 2nd 3rd allocation BOOTP client/server exchanges customizing servers addresses APIPA APs authorizing BOOTP support clustering configuring daemons DNS exclusions/reservations installing large/routed environments leasing managing logging MMC Action menu Red Hat Linux relay agents 2nd troubleshooting SOHO networks Unix WAP/routers DHCPINFORM packet DIAC (Dedicated Inquiry Access Code) diagnostics NICs T-carrier systems Dial-In tab dial-up connections 2nd optimizing PPP SLIP Windows 2000 Professional Client Dial-Up Networking profile dialectic dialects (SMB) Dialing Information dialog box dialog boxes Account Information account Policy Add Button Add Printer Add Server Add Standalone Snap-in Add Trusted Domains Add Users and Groups 2nd Add/Remove Snap-in Audit Policy Auditing Entry Configure DNS Configure Gateway Create New Schema Create New User Dialing Information FPNW 5.0 Group Memberships Initial Reverse Synchronization Install File and Print Services for NetWare Install From Disk Local Area Connection Properties Local Area Network (LAN) Logon Hours Logon Workstations Networking Services 2nd New Local group New Object-Group New Object-User New Printer Detection New User Proxy Settings Report System Compatibility Select Network Component Type Select Network Protocol Select Network Service Select User Computer or Group Trust Relationships Trusted Domains User Environment Profile DIB (Directory Information Base) Diffie-Helman groups digest authentication digital certificates 2nd digital enhanced cordless telecommunications (DECT) Digital Equipment Corporation digital signatures Digital Subscriber Lines (DSLs) 2nd CAP comparing cable modems DMT DSLM PSTN xDSL Dijkstra algorithm direct maps Direct Sequence Spread Spectrum (DSSS) systems 2nd directories Active Directory [See Active Directory.] application programming events LDAP metadirectories modeling NetWare replicating servers services spool Directory Access Protocol (DAP) Directory Information Base (DIB) Directory Information Shadowing Protocol (DISP) Directory Information Tree (DIT) Directory Operational Binding Management Protocol (DOP) Directory System Agent (DSA) Directory System Protocol (DSP) Directory User Agent (DUA) disabling default options Unix printers disaster recovery Discard Eligibility (DE) Discrete MultiTone (DMT) diskless workstations (BOOTP) client/server exchanges (DHCP) DHCP downloading operating systems options fields packet formats request/reply mechanisms DISP (Directory Information Shadowing Protocol) display filters distance limitations (802.11b networks) distance-vector protocols (RIP) router updates scalability version 2 distinguished name (DN) 2nd Distributed Coordination Function (DCF) distributed denial-of-service attacks 2nd Distributed File System (DFS) adding links creating DIT (Directory Information Tree) ditroff command DLC (Data Link Control) DLCI (Data Link Connection Identifier) DM1 packet DMT (Discrete MultiTone) DMZs (demilitarized zones) 2nd 3rd creating Port Forwarding/Triggering dialogs, comparing DN (distinguished name) 2nd DNS (Domain Name Service) 2nd 3rd 4th 5th 6th Active Directory clients, configuring DDNS Active Directory implementing DHCP resource records servers TCP/IP Unix Windows 2000 WINS DOCSIS (Data Over Cable Service Interface Specification) Document Properties 2nd documentation 2nd installation maintenance 2nd RFCs 2nd testing tools documents IEEE 802 Internet Draft Network Connection Policy networks upgrades DOD (Department of Defense) Domain Admins user groups domain component (DC) domain local groups Domain Name System [See DNS (Domain Name Service).] domainname command (NIS) domains administrative rights arranging BIND centralized/decentralized management collisions 2nd computers, adding controllers local domain groups master domain models models namespaces resource top-level trees users, creating Windows NT controllers models replication between controllers trust relationships workgroups DON'T command door locks (physical network security) down time, preventing downloading operating systems (BOOTP) downtime, scheduling drawings (wiring) drivers software NDIS ODI packet Drivers Windows NT, selecting DSA (Directory System Agent) DSAP (Destination Service Access Point) DSL (Digital Subscriber Line) 2nd cable modems, comparing CAP costs DMT DSLAM PSTN SDSL service straight-line distance troubleshooting xDSL DSLAM (DSL Access Multiplexer) DSSS (Direct Sequence Spread-Spectrum) 2nd DSU (data service unit) DT (Data Terminal) DTE (data terminal equipment) 2nd DUA (Directory User Agent) dual-mode Access Points dual-mode network adapters dual-mode wireless networks dual-redundant network controllers DUMPEL.EXE (Dump Event Log) DVDs, rewritable Dynamic DNS [See DDNS (Dynamic DNS).] Dynamic Host Configuration Protocol [See DHCP (Dynamic Host Configuration Protocol).] dynamic packet filters dynamic updates, configuring |