Index D


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

D-Link  
DAC (Device Access Code)  
daemons  
       DHCP   2nd   3rd  
       lpd.   [See also lpd daemon]
       network security   2nd  
       NFS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
               server-side   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
       rpcbind  
       syslog  
       ypserve (NIS)  
daisy-chaing.   [See also ethernets ]
daisy-chaining  
DAP (Directory Access Protocol)  
DATA command   2nd  
Data Encryption Standard (DES)  
data formatting
       IMAP4   2nd  
Data Link Connection Identifier (DLCI)   2nd  
Data Link Control (DLC)   2nd   3rd  
Data Link layer  
Data Over Cable Service Interface Specification.   [See DOCSIS]
data packet frames (PAC)  
data service unit (DSU)   2nd  
Data symbol  
Data Terminal (DT)  
data terminal equipment (DTE)   2nd  
data transfers
       FTP (File Transfer Protocol)   2nd   3rd   4th  
databases
       Active Directory.   [See Active Directory]
       Bindery   2nd  
               comparing NDS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
               Services   2nd   3rd   4th   5th  
       comparing   2nd  
       consistency  
       LSDB (Link State Database)   2nd   3rd   4th   5th  
       modifying  
       NIS (Network Information System)   2nd  
       restoring  
       SAM (security accounts manager)
               domains   2nd   3rd   4th  
       scavenging  
       searching   2nd  
       security
               creating trust relationships   2nd   3rd   4th   5th  
               interdomain trust relationships   2nd   3rd   4th  
       X.500   2nd  
               acronyms   2nd   3rd   4th  
               schema  
datagram headers
       IP (Internet Protocol)   2nd   3rd   4th   5th   6th   7th  
datagrams
       length  
Datapoint  
db (decibels)  
DC (domain component)  
DC (domain controller)   2nd  
DCF (Distributed Coordination Function)  
DDNS
       implementing   2nd   3rd  
DDNS (Dynamic DNS)
       Active Directory   2nd  
DE (Discard Eligibility)   2nd  
decentralized management   2nd   3rd  
decibels (db)  
DECnet  
DECnet protocols  
decoding
       protocols  
DECT (digital enhanced cordless telecommunications)  
dedicated connections
       ATM (Asynchronous Transfer Mode)   2nd  
               architecture   2nd   3rd   4th   5th   6th  
               connections   2nd  
               frames   2nd   3rd  
               LAN emulation   2nd  
               service categories   2nd   3rd   4th  
       frame relay   2nd   3rd   4th   5th   6th   7th   8th  
               LMI (Local Management Interface)  
               preventing network congestion   2nd   3rd  
               SVC (switched virtual circuits)   2nd  
               troubleshooting   2nd   3rd  
       leased lines   2nd   3rd  
               Fractional T1  
               T-carrier system   2nd   3rd   4th  
               troubleshooting T-carrier systems   2nd   3rd   4th   5th  
       X.25   2nd   3rd   4th  
Dedicated Inquiry Access Code (DIAC)  
default options
       disabling
               network security   2nd  
defaults
       rights
               NetWare   2nd   3rd  
defining
       goals  
DELE command  
delegated administration
       NetWare  
delegating authority
       network security  
               specialized servers   2nd  
                user accounts   2nd  
delegation
       admnistrative rights   2nd   3rd  
       LAN
               responsibilities   2nd   3rd  
       OU (organizational unit)  
deleting
       applications  
       hardware  
       objects
               databases  
       printers
               Unix  
delivery
       notification of   2nd  
demilitarized zone (DMZ)   2nd  
denial of service attacks  
denial-of-service attacks   2nd  
Department of Defense (DOD)  
deploying
       upgrades   2nd   3rd  
deployment
       bus topologies  
       network upgrades  
DES (Data Encryption Standard)  
design
       campus networks   2nd   3rd   4th  
       logical networks
                components   2nd   3rd   4th   5th   6th   7th   8th   9th  
               maintaining  
               physical networks  
               planning   2nd   3rd   4th   5th   6th   7th  
       multi-tiered networks  
       multi-tiered topologies   2nd   3rd  
desktops
       Gigabit Ethernets  
destination addresses   2nd  
destination IP addresses  
Destination Node Identification (DID)  
destination options, IPv6  
Destination Service Access Point (DSAP)  
destinations
       IPv6  
detecting
       failed logon attempts   2nd   3rd  
detection
       collisions  
       intrusion.   [See Intrusion Detection]
determining needs for network upgrades   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
development
       master plans   2nd   3rd   4th  
               joining trees  
               master domain model   2nd   3rd   4th   5th  
               upgrading BDCs   2nd  
               upgrading PDCs   2nd   3rd   4th   5th  
Device Access Code (DAC)  
devices
       Bluetooth.   [See Bluetooth]
       BOOTP   2nd  
               client/server exchanges (DHCP)   2nd   3rd   4th   5th   6th   7th   8th   9th  
               customizing DHCP   2nd   3rd   4th   5th  
               DHCP   2nd   3rd   4th   5th   6th   7th  
               downloading operating systems   2nd  
               options fields   2nd   3rd   4th   5th  
               packet formats   2nd   3rd   4th   5th  
               request/reply mechanisms   2nd   3rd   4th  
       communication   2nd   3rd   4th  
       IEEE 802.11g   2nd  
               increasing bandwidth   2nd  
       interference   2nd  
       modes
               Bluetooth   2nd  
       NAS   2nd   3rd  
               capacity   2nd   3rd   4th  
               network appliances   2nd  
               protocols   2nd  
       networks  
       printing   2nd   3rd   4th  
       SANs   2nd   3rd   4th  
               applying NAS   2nd  
               Arbitrated Loops   2nd   3rd   4th   5th   6th   7th   8th   9th  
               fabric switched topology   2nd   3rd   4th   5th  
               Fibre Channel   2nd   3rd   4th  
               IP   2nd   3rd  
               mixed topologies   2nd   3rd   4th  
       Token-Ring
               replacing   2nd  
       translation
               Ethernets/Token-Ring networks  
       wireless  
               3G mobile phones   2nd  
               PDAs   2nd  
DFS (Distributed File System)   2nd   3rd   4th   5th   6th  
       roots
               adding links   2nd   3rd  
               creating   2nd   3rd  
DHCP
       allocation  
       BOOTP   2nd   3rd   4th   5th   6th   7th  
               client/server exchanges   2nd   3rd   4th   5th   6th   7th   8th   9th  
               customizing   2nd   3rd   4th   5th  
       servers   2nd   3rd   4th   5th   6th  
               APIPA   2nd  
               authorizing   2nd   3rd  
               BOOTP support  
               clustering   2nd  
               configuring   2nd   3rd   4th  
               daemons   2nd   3rd  
               DNS   2nd   3rd   4th   5th   6th  
               exclusions/ reservations   2nd  
               installing   2nd   3rd  
               large/routed environments  
               leasing  
               managing logging   2nd   3rd  
               MMC Action menu   2nd   3rd   4th   5th   6th   7th   8th  
               Red Hat Linux   2nd  
               relay agents   2nd   3rd   4th  
               troubleshooting  
       Unix   2nd   3rd   4th   5th   6th  
DHCP (Dymanic Host Configuration Protocol)  
DHCP (Dynamic Host Configuration Protocol)   2nd  
DHCP (Dynamic Host Configuration)  
DHCPINFORM packet  
DIAC (Dedicated Inquiry Access Code)  
diagnostics
       NIC (network interface card)   2nd  
       T-carrier systems   2nd   3rd   4th   5th  
dial-in access
       allowing  
Dial-In tab  
dial-up connections   2nd  
       optimizing   2nd  
       PPP (Point-to-Point Protocol)   2nd   3rd   4th   5th   6th   7th  
               establishing LCP   2nd   3rd   4th   5th   6th  
               NCP (Network Control Protocol)   2nd  
       SLIP (Serial Line Internet Protocol)   2nd   3rd   4th   5th   6th   7th  
       Windows 2000 Professional Client
               configuring   2nd   3rd   4th   5th  
Dial-Up Networking profile  
dialectic  
dialects
       SMB  
Dialin Information dialog box   2nd  
dialog boxes
       Account Information   2nd   3rd   4th   5th   6th  
       account Policy   2nd  
       Add Button  
       Add Printer  
       Add Server  
       Add Standalone Snap-in  
       Add Trusted Domains  
       Add Users and Groups   2nd   3rd  
       Add/Remove Snap-in  
       Audit Policy  
       Auditing Entry  
       Configure DNS  
       Configure Gateway  
       Create New Schema  
       Create New User  
       Dialin Information   2nd  
       FPNW 5.0  
        Group Memberships   2nd  
       Initial Reverse Synchronization  
       Install File and Print Services for NetWare  
       Install From Disk  
       Local Area Connection Properties  
       Local Area Network (LAN)  
       Logon Hours   2nd  
       Logon Workstations   2nd  
       Networking Services   2nd  
       New Local group  
       New Object-Group  
       New Object-User  
       New Printer Detection  
       New User   2nd  
       Proxy Settings   2nd  
       Report System Compatibility  
       Select Network Component Type  
       Select Network Protocol  
       Select Network Service  
       Select User Computer or Group  
       Trust Relationships  
       Trusted Domains  
       User Environment Profile   2nd  
DIB (Directory Information Base   2nd  
DID (Destination Node Identification)  
Diffie-Helman groups  
digest authentication  
digital certificates   2nd   3rd   4th   5th   6th   7th   8th  
digital enhanced cordless telecommunications (DECT)  
Digital Equipmentn Corporation  
Digital Linear Tape (DLT)  
digital signatures  
digital subscriber line (DSL)  
Digital Subscriber Line (DSL)   2nd  
       CAP (Carrierless Amplitude Phase)  
       comparing cable modems   2nd   3rd   4th   5th  
       DMT (Discrete MultiTone)   2nd   3rd   4th   5th  
       DSLM (DSL Access Multiplexer)  
       PSTN   2nd   3rd  
       xDSL   2nd   3rd  
Dijkstra algorithm  
direct maps  
Direct Sequence Spread Spectrum (DSSS)  
directories
       Active Directory.   [See Active Directory]
       eDirectory  
               features   2nd   3rd   4th  
               installing   2nd   3rd   4th  
       LDAP   2nd   3rd   4th   5th   6th  
               interoperability   2nd  
               selecting   2nd  
        metadirectories  
       metdirectories  
       modeling   2nd   3rd  
       NetWare   2nd  
               Bindery   2nd  
               Bindery Services   2nd   3rd   4th   5th  
               comparing Bindery/NDS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
               configuring NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th  
               NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th  
       replicating   2nd  
       spool
               creating  
directory
       events   2nd  
Directory Access Protocol (DAP)  
Directory Information Base (DIB)   2nd  
Directory Information Shadowing Protocol (DISP)  
Directory Information Tree (DIT)   2nd  
Directory Operational Binding Management Protocol (DOP)  
directory services
       NDS (Novell Directory Service)  
       X.500   2nd   3rd   4th  
               acronyms   2nd   3rd   4th  
               schema  
Directory System Agent (DSA)  
Directory System Protocol (DSP)  
directory trees  
Directory User Agent (DUA)   2nd  
directory-aware application programming   2nd  
diretcories
       NetWare
               rights   2nd  
disabling
       default options
               network security   2nd  
       Unix printers   2nd  
disaster recovery  
Discard Eligibility (DE)   2nd  
discovery
       Bluetooth   2nd  
Discrete MultiTone (DMT)   2nd   3rd   4th   5th   6th  
diskless workstations
       BOOTP   2nd  
               client/server exchanges (DHCP)   2nd   3rd   4th   5th   6th   7th   8th   9th  
               customizing DHCP   2nd   3rd   4th   5th  
               DHCP   2nd   3rd   4th   5th   6th   7th  
               downloading operating systems   2nd  
               options fields   2nd   3rd   4th   5th  
               packet formats   2nd   3rd   4th   5th  
               request/reply mechanisms   2nd   3rd   4th  
DISP (Directory Information Shadowing Protocol)  
display filters   2nd   3rd  
disposing
       hardware and media
               as physical network security measure   2nd  
distance limitations, 802.11b networking  
distance-vector protocols
       RIP (Routing Information Protocol)   2nd   3rd   4th   5th   6th  
               router updates   2nd   3rd   4th  
               scalability   2nd  
               version 2   2nd   3rd  
distinguished name (DN)   2nd   3rd   4th  
Distributed Coordination Function (DCF)  
distributed denial-of-service attack  
distributed denial-of-service attacks   2nd   3rd   4th  
Distributed File System (DFS)   2nd   3rd   4th   5th   6th  
       roots
               adding links   2nd   3rd  
               creating   2nd   3rd  
DIT (Directory Information Tree)   2nd  
ditroff command  
DLC (Data Link Control)   2nd   3rd  
DLCI (Data Link Connection Identifier)  
DLCI (data Link Connection Identifier)  
DLT (Digital Linear Tape)  
DM1 packet  
DMT (Discrete MultiTone)   2nd   3rd   4th   5th   6th  
DMZ (demilitarized zone)   2nd  
DN (distinguished name)   2nd   3rd   4th  
DNS   2nd  
        clients
               configuring   2nd   3rd   4th   5th   6th   7th  
       DHCP   2nd   3rd   4th   5th   6th  
       resource records   2nd   3rd   4th  
       servers
               files  
       TCP/IP   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd  
       Unix
               configuring   2nd  
       Windows 2000
               installing  
       WINS
               interaction  
DNS (Domain Name Service)  
DNS (Domain Name System)   2nd   3rd   4th   5th  
       Active Directory  
       DDNS (Dynamic DNS).   [See DDNS]
DOCSIS (Data Over Cable Service Interface Specification)   2nd  
Document Properties   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       Windows 2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
documentation   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       installation   2nd  
       maintenance   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
       RFCs.   [See RFCs]
       tetsing   2nd  
       tools
               online/paper   2nd  
               spreadsheets/word processors   2nd   3rd   4th  
documents
       IEEE 802
               obtaining  
       Internet Draft  
       Network Connection Policy   2nd  
       networks
               mapping   2nd   3rd  
               planning   2nd  
       upgrades
               closing  
DOD (Department of Defense)  
Domain Admins user groups  
domain component (DC)  
domain local groups  
Domain Name Service (DNS)  
Domain Name System (DNS)   2nd   3rd   4th  
Domain Name Sytem.   [See DNS]
domainname command (NIS)   2nd  
domains
       administrative rights
               delegating   2nd   3rd  
       arranging   2nd  
       BIND (Berkeley Internet Name Domain)  
       broadcast  
       centralized/decentralized management   2nd   3rd  
       collisions   2nd   3rd  
       collison domains
               segmenting   2nd  
       computers
               adding   2nd  
       controllers   2nd   3rd  
       local domain groups  
       master domain models   2nd   3rd   4th   5th  
       models
               Active Directory   2nd  
       namespaces   2nd  
       resource  
       top-level   2nd  
       trees
               Active Directory   2nd   3rd   4th  
               partitioning Active Directory   2nd  
       users
               creating   2nd   3rd  
       Windows NT
               controllers   2nd   3rd  
               creating trust relationships   2nd   3rd   4th   5th  
               interdomain trust relationships   2nd   3rd   4th  
               models   2nd   3rd   4th   5th   6th   7th   8th  
               replication between controllers   2nd   3rd   4th  
               workgroups   2nd   3rd   4th  
DON'T command  
door locks (physical network security measure)   2nd  
DOP (Directory Operational Binding Management Protocol)  
down time
       preventing   2nd  
downloading operating systems (BOOTP)   2nd  
downtime, scheduling  
drafts
       IEEE
               creating  
drawings
       wiring  
drivers
       high-impedance  
       low-impedance  
       software  
               NDIS (Network Driver Interface Specification)   2nd  
               ODI (Open Data-Link Interface)   2nd  
               packet Drivers   2nd  
       Windows NT
               selecting   2nd  
DSA (Directory System Agent)  
DSAP (Destination Service Access Point)  
DSL (digital subscriber line)  
DSL (Digital Subscriber Line)   2nd  
       CAP (Carrierless Amplitiude Phase)  
       comparing cable modems   2nd   3rd   4th   5th  
       DMT (Discrete MultiTone)   2nd   3rd   4th   5th  
       DSLAM (DSL Access Multiplexer)  
       PSTN   2nd   3rd  
       xDSL   2nd   3rd  
DSL Access Multiplexer (DSLAM)   2nd  
DSLAM (DSL Access Multiplexer)  
DSLM (DSL Access Multiplexer)  
DSP (Directory System Protocol)  
DSSS (Direct Sequence Spread Spectrum)  
DSU (data service unit)   2nd  
DT (Data Terminal)  
DTE (data terminal equipment)   2nd  
DUA (Directory User Agent)   2nd  
dual-mode Accent Point   2nd  
dual-redundant network controllers   2nd  
Dump Event Log (DUMPEL.EXE)  
DUMPEL.EXE (Dump Event Log)  
Dynamic DNS.   [See DDNS]
Dynamic Host Configuration Protocol (DHCP)   2nd   3rd   4th  
dynamic packet filters   2nd  
dynamic updates
       configuring   2nd   3rd   4th  



Upgrading and Repairing Networks
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2003
Pages: 434

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net