[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] D-Link DAC (Device Access Code) daemons DHCP 2nd 3rd lpd. [See also lpd daemon] network security 2nd NFS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th server-side 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th rpcbind syslog ypserve (NIS) daisy-chaing. [See also ethernets ] daisy-chaining DAP (Directory Access Protocol) DATA command 2nd Data Encryption Standard (DES) data formatting IMAP4 2nd Data Link Connection Identifier (DLCI) 2nd Data Link Control (DLC) 2nd 3rd Data Link layer Data Over Cable Service Interface Specification. [See DOCSIS] data packet frames (PAC) data service unit (DSU) 2nd Data symbol Data Terminal (DT) data terminal equipment (DTE) 2nd data transfers FTP (File Transfer Protocol) 2nd 3rd 4th databases Active Directory. [See Active Directory] Bindery 2nd comparing NDS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th Services 2nd 3rd 4th 5th comparing 2nd consistency LSDB (Link State Database) 2nd 3rd 4th 5th modifying NIS (Network Information System) 2nd restoring SAM (security accounts manager) domains 2nd 3rd 4th scavenging searching 2nd security creating trust relationships 2nd 3rd 4th 5th interdomain trust relationships 2nd 3rd 4th X.500 2nd acronyms 2nd 3rd 4th schema datagram headers IP (Internet Protocol) 2nd 3rd 4th 5th 6th 7th datagrams length Datapoint db (decibels) DC (domain component) DC (domain controller) 2nd DCF (Distributed Coordination Function) DDNS implementing 2nd 3rd DDNS (Dynamic DNS) Active Directory 2nd DE (Discard Eligibility) 2nd decentralized management 2nd 3rd decibels (db) DECnet DECnet protocols decoding protocols DECT (digital enhanced cordless telecommunications) dedicated connections ATM (Asynchronous Transfer Mode) 2nd architecture 2nd 3rd 4th 5th 6th connections 2nd frames 2nd 3rd LAN emulation 2nd service categories 2nd 3rd 4th frame relay 2nd 3rd 4th 5th 6th 7th 8th LMI (Local Management Interface) preventing network congestion 2nd 3rd SVC (switched virtual circuits) 2nd troubleshooting 2nd 3rd leased lines 2nd 3rd Fractional T1 T-carrier system 2nd 3rd 4th troubleshooting T-carrier systems 2nd 3rd 4th 5th X.25 2nd 3rd 4th Dedicated Inquiry Access Code (DIAC) default options disabling network security 2nd defaults rights NetWare 2nd 3rd defining goals DELE command delegated administration NetWare delegating authority network security specialized servers 2nd user accounts 2nd delegation admnistrative rights 2nd 3rd LAN responsibilities 2nd 3rd OU (organizational unit) deleting applications hardware objects databases printers Unix delivery notification of 2nd demilitarized zone (DMZ) 2nd denial of service attacks denial-of-service attacks 2nd Department of Defense (DOD) deploying upgrades 2nd 3rd deployment bus topologies network upgrades DES (Data Encryption Standard) design campus networks 2nd 3rd 4th logical networks components 2nd 3rd 4th 5th 6th 7th 8th 9th maintaining physical networks planning 2nd 3rd 4th 5th 6th 7th multi-tiered networks multi-tiered topologies 2nd 3rd desktops Gigabit Ethernets destination addresses 2nd destination IP addresses Destination Node Identification (DID) destination options, IPv6 Destination Service Access Point (DSAP) destinations IPv6 detecting failed logon attempts 2nd 3rd detection collisions intrusion. [See Intrusion Detection] determining needs for network upgrades 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th development master plans 2nd 3rd 4th joining trees master domain model 2nd 3rd 4th 5th upgrading BDCs 2nd upgrading PDCs 2nd 3rd 4th 5th Device Access Code (DAC) devices Bluetooth. [See Bluetooth] BOOTP 2nd client/server exchanges (DHCP) 2nd 3rd 4th 5th 6th 7th 8th 9th customizing DHCP 2nd 3rd 4th 5th DHCP 2nd 3rd 4th 5th 6th 7th downloading operating systems 2nd options fields 2nd 3rd 4th 5th packet formats 2nd 3rd 4th 5th request/reply mechanisms 2nd 3rd 4th communication 2nd 3rd 4th IEEE 802.11g 2nd increasing bandwidth 2nd interference 2nd modes Bluetooth 2nd NAS 2nd 3rd capacity 2nd 3rd 4th network appliances 2nd protocols 2nd networks printing 2nd 3rd 4th SANs 2nd 3rd 4th applying NAS 2nd Arbitrated Loops 2nd 3rd 4th 5th 6th 7th 8th 9th fabric switched topology 2nd 3rd 4th 5th Fibre Channel 2nd 3rd 4th IP 2nd 3rd mixed topologies 2nd 3rd 4th Token-Ring replacing 2nd translation Ethernets/Token-Ring networks wireless 3G mobile phones 2nd PDAs 2nd DFS (Distributed File System) 2nd 3rd 4th 5th 6th roots adding links 2nd 3rd creating 2nd 3rd DHCP allocation BOOTP 2nd 3rd 4th 5th 6th 7th client/server exchanges 2nd 3rd 4th 5th 6th 7th 8th 9th customizing 2nd 3rd 4th 5th servers 2nd 3rd 4th 5th 6th APIPA 2nd authorizing 2nd 3rd BOOTP support clustering 2nd configuring 2nd 3rd 4th daemons 2nd 3rd DNS 2nd 3rd 4th 5th 6th exclusions/ reservations 2nd installing 2nd 3rd large/routed environments leasing managing logging 2nd 3rd MMC Action menu 2nd 3rd 4th 5th 6th 7th 8th Red Hat Linux 2nd relay agents 2nd 3rd 4th troubleshooting Unix 2nd 3rd 4th 5th 6th DHCP (Dymanic Host Configuration Protocol) DHCP (Dynamic Host Configuration Protocol) 2nd DHCP (Dynamic Host Configuration) DHCPINFORM packet DIAC (Dedicated Inquiry Access Code) diagnostics NIC (network interface card) 2nd T-carrier systems 2nd 3rd 4th 5th dial-in access allowing Dial-In tab dial-up connections 2nd optimizing 2nd PPP (Point-to-Point Protocol) 2nd 3rd 4th 5th 6th 7th establishing LCP 2nd 3rd 4th 5th 6th NCP (Network Control Protocol) 2nd SLIP (Serial Line Internet Protocol) 2nd 3rd 4th 5th 6th 7th Windows 2000 Professional Client configuring 2nd 3rd 4th 5th Dial-Up Networking profile dialectic dialects SMB Dialin Information dialog box 2nd dialog boxes Account Information 2nd 3rd 4th 5th 6th account Policy 2nd Add Button Add Printer Add Server Add Standalone Snap-in Add Trusted Domains Add Users and Groups 2nd 3rd Add/Remove Snap-in Audit Policy Auditing Entry Configure DNS Configure Gateway Create New Schema Create New User Dialin Information 2nd FPNW 5.0 Group Memberships 2nd Initial Reverse Synchronization Install File and Print Services for NetWare Install From Disk Local Area Connection Properties Local Area Network (LAN) Logon Hours 2nd Logon Workstations 2nd Networking Services 2nd New Local group New Object-Group New Object-User New Printer Detection New User 2nd Proxy Settings 2nd Report System Compatibility Select Network Component Type Select Network Protocol Select Network Service Select User Computer or Group Trust Relationships Trusted Domains User Environment Profile 2nd DIB (Directory Information Base 2nd DID (Destination Node Identification) Diffie-Helman groups digest authentication digital certificates 2nd 3rd 4th 5th 6th 7th 8th digital enhanced cordless telecommunications (DECT) Digital Equipmentn Corporation Digital Linear Tape (DLT) digital signatures digital subscriber line (DSL) Digital Subscriber Line (DSL) 2nd CAP (Carrierless Amplitude Phase) comparing cable modems 2nd 3rd 4th 5th DMT (Discrete MultiTone) 2nd 3rd 4th 5th DSLM (DSL Access Multiplexer) PSTN 2nd 3rd xDSL 2nd 3rd Dijkstra algorithm direct maps Direct Sequence Spread Spectrum (DSSS) directories Active Directory. [See Active Directory] eDirectory features 2nd 3rd 4th installing 2nd 3rd 4th LDAP 2nd 3rd 4th 5th 6th interoperability 2nd selecting 2nd metadirectories metdirectories modeling 2nd 3rd NetWare 2nd Bindery 2nd Bindery Services 2nd 3rd 4th 5th comparing Bindery/NDS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th configuring NDS (NetWare Directory Service) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th NDS (NetWare Directory Service) 2nd 3rd 4th 5th 6th 7th 8th 9th replicating 2nd spool creating directory events 2nd Directory Access Protocol (DAP) Directory Information Base (DIB) 2nd Directory Information Shadowing Protocol (DISP) Directory Information Tree (DIT) 2nd Directory Operational Binding Management Protocol (DOP) directory services NDS (Novell Directory Service) X.500 2nd 3rd 4th acronyms 2nd 3rd 4th schema Directory System Agent (DSA) Directory System Protocol (DSP) directory trees Directory User Agent (DUA) 2nd directory-aware application programming 2nd diretcories NetWare rights 2nd disabling default options network security 2nd Unix printers 2nd disaster recovery Discard Eligibility (DE) 2nd discovery Bluetooth 2nd Discrete MultiTone (DMT) 2nd 3rd 4th 5th 6th diskless workstations BOOTP 2nd client/server exchanges (DHCP) 2nd 3rd 4th 5th 6th 7th 8th 9th customizing DHCP 2nd 3rd 4th 5th DHCP 2nd 3rd 4th 5th 6th 7th downloading operating systems 2nd options fields 2nd 3rd 4th 5th packet formats 2nd 3rd 4th 5th request/reply mechanisms 2nd 3rd 4th DISP (Directory Information Shadowing Protocol) display filters 2nd 3rd disposing hardware and media as physical network security measure 2nd distance limitations, 802.11b networking distance-vector protocols RIP (Routing Information Protocol) 2nd 3rd 4th 5th 6th router updates 2nd 3rd 4th scalability 2nd version 2 2nd 3rd distinguished name (DN) 2nd 3rd 4th Distributed Coordination Function (DCF) distributed denial-of-service attack distributed denial-of-service attacks 2nd 3rd 4th Distributed File System (DFS) 2nd 3rd 4th 5th 6th roots adding links 2nd 3rd creating 2nd 3rd DIT (Directory Information Tree) 2nd ditroff command DLC (Data Link Control) 2nd 3rd DLCI (Data Link Connection Identifier) DLCI (data Link Connection Identifier) DLT (Digital Linear Tape) DM1 packet DMT (Discrete MultiTone) 2nd 3rd 4th 5th 6th DMZ (demilitarized zone) 2nd DN (distinguished name) 2nd 3rd 4th DNS 2nd clients configuring 2nd 3rd 4th 5th 6th 7th DHCP 2nd 3rd 4th 5th 6th resource records 2nd 3rd 4th servers files TCP/IP 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd Unix configuring 2nd Windows 2000 installing WINS interaction DNS (Domain Name Service) DNS (Domain Name System) 2nd 3rd 4th 5th Active Directory DDNS (Dynamic DNS). [See DDNS] DOCSIS (Data Over Cable Service Interface Specification) 2nd Document Properties 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Windows 2000 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th documentation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th installation 2nd maintenance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th RFCs. [See RFCs] tetsing 2nd tools online/paper 2nd spreadsheets/word processors 2nd 3rd 4th documents IEEE 802 obtaining Internet Draft Network Connection Policy 2nd networks mapping 2nd 3rd planning 2nd upgrades closing DOD (Department of Defense) Domain Admins user groups domain component (DC) domain local groups Domain Name Service (DNS) Domain Name System (DNS) 2nd 3rd 4th Domain Name Sytem. [See DNS] domainname command (NIS) 2nd domains administrative rights delegating 2nd 3rd arranging 2nd BIND (Berkeley Internet Name Domain) broadcast centralized/decentralized management 2nd 3rd collisions 2nd 3rd collison domains segmenting 2nd computers adding 2nd controllers 2nd 3rd local domain groups master domain models 2nd 3rd 4th 5th models Active Directory 2nd namespaces 2nd resource top-level 2nd trees Active Directory 2nd 3rd 4th partitioning Active Directory 2nd users creating 2nd 3rd Windows NT controllers 2nd 3rd creating trust relationships 2nd 3rd 4th 5th interdomain trust relationships 2nd 3rd 4th models 2nd 3rd 4th 5th 6th 7th 8th replication between controllers 2nd 3rd 4th workgroups 2nd 3rd 4th DON'T command door locks (physical network security measure) 2nd DOP (Directory Operational Binding Management Protocol) down time preventing 2nd downloading operating systems (BOOTP) 2nd downtime, scheduling drafts IEEE creating drawings wiring drivers high-impedance low-impedance software NDIS (Network Driver Interface Specification) 2nd ODI (Open Data-Link Interface) 2nd packet Drivers 2nd Windows NT selecting 2nd DSA (Directory System Agent) DSAP (Destination Service Access Point) DSL (digital subscriber line) DSL (Digital Subscriber Line) 2nd CAP (Carrierless Amplitiude Phase) comparing cable modems 2nd 3rd 4th 5th DMT (Discrete MultiTone) 2nd 3rd 4th 5th DSLAM (DSL Access Multiplexer) PSTN 2nd 3rd xDSL 2nd 3rd DSL Access Multiplexer (DSLAM) 2nd DSLAM (DSL Access Multiplexer) DSLM (DSL Access Multiplexer) DSP (Directory System Protocol) DSSS (Direct Sequence Spread Spectrum) DSU (data service unit) 2nd DT (Data Terminal) DTE (data terminal equipment) 2nd DUA (Directory User Agent) 2nd dual-mode Accent Point 2nd dual-redundant network controllers 2nd Dump Event Log (DUMPEL.EXE) DUMPEL.EXE (Dump Event Log) Dynamic DNS. [See DDNS] Dynamic Host Configuration Protocol (DHCP) 2nd 3rd 4th dynamic packet filters 2nd dynamic updates configuring 2nd 3rd 4th |