Upgrading and Repairing Networks (5th Edition)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

D-Link  

DAC (Device Access Code)  

daemons  

       DHCP   2nd   3rd  

       lpd.   [See also lpd daemon]

       network security   2nd  

       NFS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

               server-side   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

       rpcbind  

       syslog  

       ypserve (NIS)  

daisy-chaing.   [See also ethernets ]

daisy-chaining  

DAP (Directory Access Protocol)  

DATA command   2nd  

Data Encryption Standard (DES)  

data formatting

       IMAP4   2nd  

Data Link Connection Identifier (DLCI)   2nd  

Data Link Control (DLC)   2nd   3rd  

Data Link layer  

Data Over Cable Service Interface Specification.   [See DOCSIS]

data packet frames (PAC)  

data service unit (DSU)   2nd  

Data symbol  

Data Terminal (DT)  

data terminal equipment (DTE)   2nd  

data transfers

       FTP (File Transfer Protocol)   2nd   3rd   4th  

databases

       Active Directory.   [See Active Directory]

       Bindery   2nd  

               comparing NDS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               Services   2nd   3rd   4th   5th  

       comparing   2nd  

       consistency  

       LSDB (Link State Database)   2nd   3rd   4th   5th  

       modifying  

       NIS (Network Information System)   2nd  

       restoring  

       SAM (security accounts manager)

               domains   2nd   3rd   4th  

       scavenging  

       searching   2nd  

       security

               creating trust relationships   2nd   3rd   4th   5th  

               interdomain trust relationships   2nd   3rd   4th  

       X.500   2nd  

               acronyms   2nd   3rd   4th  

               schema  

datagram headers

       IP (Internet Protocol)   2nd   3rd   4th   5th   6th   7th  

datagrams

       length  

Datapoint  

db (decibels)  

DC (domain component)  

DC (domain controller)   2nd  

DCF (Distributed Coordination Function)  

DDNS

       implementing   2nd   3rd  

DDNS (Dynamic DNS)

       Active Directory   2nd  

DE (Discard Eligibility)   2nd  

decentralized management   2nd   3rd  

decibels (db)  

DECnet  

DECnet protocols  

decoding

       protocols  

DECT (digital enhanced cordless telecommunications)  

dedicated connections

       ATM (Asynchronous Transfer Mode)   2nd  

               architecture   2nd   3rd   4th   5th   6th  

               connections   2nd  

               frames   2nd   3rd  

               LAN emulation   2nd  

               service categories   2nd   3rd   4th  

       frame relay   2nd   3rd   4th   5th   6th   7th   8th  

               LMI (Local Management Interface)  

               preventing network congestion   2nd   3rd  

               SVC (switched virtual circuits)   2nd  

               troubleshooting   2nd   3rd  

       leased lines   2nd   3rd  

               Fractional T1  

               T-carrier system   2nd   3rd   4th  

               troubleshooting T-carrier systems   2nd   3rd   4th   5th  

       X.25   2nd   3rd   4th  

Dedicated Inquiry Access Code (DIAC)  

default options

       disabling

               network security   2nd  

defaults

       rights

               NetWare   2nd   3rd  

defining

       goals  

DELE command  

delegated administration

       NetWare  

delegating authority

       network security  

               specialized servers   2nd  

                user accounts   2nd  

delegation

       admnistrative rights   2nd   3rd  

       LAN

               responsibilities   2nd   3rd  

       OU (organizational unit)  

deleting

       applications  

       hardware  

       objects

               databases  

       printers

               Unix  

delivery

       notification of   2nd  

demilitarized zone (DMZ)   2nd  

denial of service attacks  

denial-of-service attacks   2nd  

Department of Defense (DOD)  

deploying

       upgrades   2nd   3rd  

deployment

       bus topologies  

       network upgrades  

DES (Data Encryption Standard)  

design

       campus networks   2nd   3rd   4th  

       logical networks

                components   2nd   3rd   4th   5th   6th   7th   8th   9th  

               maintaining  

               physical networks  

               planning   2nd   3rd   4th   5th   6th   7th  

       multi-tiered networks  

       multi-tiered topologies   2nd   3rd  

desktops

       Gigabit Ethernets  

destination addresses   2nd  

destination IP addresses  

Destination Node Identification (DID)  

destination options, IPv6  

Destination Service Access Point (DSAP)  

destinations

       IPv6  

detecting

       failed logon attempts   2nd   3rd  

detection

       collisions  

       intrusion.   [See Intrusion Detection]

determining needs for network upgrades   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

development

       master plans   2nd   3rd   4th  

               joining trees  

               master domain model   2nd   3rd   4th   5th  

               upgrading BDCs   2nd  

               upgrading PDCs   2nd   3rd   4th   5th  

Device Access Code (DAC)  

devices

       Bluetooth.   [See Bluetooth]

       BOOTP   2nd  

               client/server exchanges (DHCP)   2nd   3rd   4th   5th   6th   7th   8th   9th  

               customizing DHCP   2nd   3rd   4th   5th  

               DHCP   2nd   3rd   4th   5th   6th   7th  

               downloading operating systems   2nd  

               options fields   2nd   3rd   4th   5th  

               packet formats   2nd   3rd   4th   5th  

               request/reply mechanisms   2nd   3rd   4th  

       communication   2nd   3rd   4th  

       IEEE 802.11g   2nd  

               increasing bandwidth   2nd  

       interference   2nd  

       modes

               Bluetooth   2nd  

       NAS   2nd   3rd  

               capacity   2nd   3rd   4th  

               network appliances   2nd  

               protocols   2nd  

       networks  

       printing   2nd   3rd   4th  

       SANs   2nd   3rd   4th  

               applying NAS   2nd  

               Arbitrated Loops   2nd   3rd   4th   5th   6th   7th   8th   9th  

               fabric switched topology   2nd   3rd   4th   5th  

               Fibre Channel   2nd   3rd   4th  

               IP   2nd   3rd  

               mixed topologies   2nd   3rd   4th  

       Token-Ring

               replacing   2nd  

       translation

               Ethernets/Token-Ring networks  

       wireless  

               3G mobile phones   2nd  

               PDAs   2nd  

DFS (Distributed File System)   2nd   3rd   4th   5th   6th  

       roots

               adding links   2nd   3rd  

               creating   2nd   3rd  

DHCP

       allocation  

       BOOTP   2nd   3rd   4th   5th   6th   7th  

               client/server exchanges   2nd   3rd   4th   5th   6th   7th   8th   9th  

               customizing   2nd   3rd   4th   5th  

       servers   2nd   3rd   4th   5th   6th  

               APIPA   2nd  

               authorizing   2nd   3rd  

               BOOTP support  

               clustering   2nd  

               configuring   2nd   3rd   4th  

               daemons   2nd   3rd  

               DNS   2nd   3rd   4th   5th   6th  

               exclusions/ reservations   2nd  

               installing   2nd   3rd  

               large/routed environments  

               leasing  

               managing logging   2nd   3rd  

               MMC Action menu   2nd   3rd   4th   5th   6th   7th   8th  

               Red Hat Linux   2nd  

               relay agents   2nd   3rd   4th  

               troubleshooting  

       Unix   2nd   3rd   4th   5th   6th  

DHCP (Dymanic Host Configuration Protocol)  

DHCP (Dynamic Host Configuration Protocol)   2nd  

DHCP (Dynamic Host Configuration)  

DHCPINFORM packet  

DIAC (Dedicated Inquiry Access Code)  

diagnostics

       NIC (network interface card)   2nd  

       T-carrier systems   2nd   3rd   4th   5th  

dial-in access

       allowing  

Dial-In tab  

dial-up connections   2nd  

       optimizing   2nd  

       PPP (Point-to-Point Protocol)   2nd   3rd   4th   5th   6th   7th  

               establishing LCP   2nd   3rd   4th   5th   6th  

               NCP (Network Control Protocol)   2nd  

       SLIP (Serial Line Internet Protocol)   2nd   3rd   4th   5th   6th   7th  

       Windows 2000 Professional Client

               configuring   2nd   3rd   4th   5th  

Dial-Up Networking profile  

dialectic  

dialects

       SMB  

Dialin Information dialog box   2nd  

dialog boxes

       Account Information   2nd   3rd   4th   5th   6th  

       account Policy   2nd  

       Add Button  

       Add Printer  

       Add Server  

       Add Standalone Snap-in  

       Add Trusted Domains  

       Add Users and Groups   2nd   3rd  

       Add/Remove Snap-in  

       Audit Policy  

       Auditing Entry  

       Configure DNS  

       Configure Gateway  

       Create New Schema  

       Create New User  

       Dialin Information   2nd  

       FPNW 5.0  

        Group Memberships   2nd  

       Initial Reverse Synchronization  

       Install File and Print Services for NetWare  

       Install From Disk  

       Local Area Connection Properties  

       Local Area Network (LAN)  

       Logon Hours   2nd  

       Logon Workstations   2nd  

       Networking Services   2nd  

       New Local group  

       New Object-Group  

       New Object-User  

       New Printer Detection  

       New User   2nd  

       Proxy Settings   2nd  

       Report System Compatibility  

       Select Network Component Type  

       Select Network Protocol  

       Select Network Service  

       Select User Computer or Group  

       Trust Relationships  

       Trusted Domains  

       User Environment Profile   2nd  

DIB (Directory Information Base   2nd  

DID (Destination Node Identification)  

Diffie-Helman groups  

digest authentication  

digital certificates   2nd   3rd   4th   5th   6th   7th   8th  

digital enhanced cordless telecommunications (DECT)  

Digital Equipmentn Corporation  

Digital Linear Tape (DLT)  

digital signatures  

digital subscriber line (DSL)  

Digital Subscriber Line (DSL)   2nd  

       CAP (Carrierless Amplitude Phase)  

       comparing cable modems   2nd   3rd   4th   5th  

       DMT (Discrete MultiTone)   2nd   3rd   4th   5th  

       DSLM (DSL Access Multiplexer)  

       PSTN   2nd   3rd  

       xDSL   2nd   3rd  

Dijkstra algorithm  

direct maps  

Direct Sequence Spread Spectrum (DSSS)  

directories

       Active Directory.   [See Active Directory]

       eDirectory  

               features   2nd   3rd   4th  

               installing   2nd   3rd   4th  

       LDAP   2nd   3rd   4th   5th   6th  

               interoperability   2nd  

               selecting   2nd  

        metadirectories  

       metdirectories  

       modeling   2nd   3rd  

       NetWare   2nd  

               Bindery   2nd  

               Bindery Services   2nd   3rd   4th   5th  

               comparing Bindery/NDS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               configuring NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th  

               NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th  

       replicating   2nd  

       spool

               creating  

directory

       events   2nd  

Directory Access Protocol (DAP)  

Directory Information Base (DIB)   2nd  

Directory Information Shadowing Protocol (DISP)  

Directory Information Tree (DIT)   2nd  

Directory Operational Binding Management Protocol (DOP)  

directory services

       NDS (Novell Directory Service)  

       X.500   2nd   3rd   4th  

               acronyms   2nd   3rd   4th  

               schema  

Directory System Agent (DSA)  

Directory System Protocol (DSP)  

directory trees  

Directory User Agent (DUA)   2nd  

directory-aware application programming   2nd  

diretcories

       NetWare

               rights   2nd  

disabling

       default options

               network security   2nd  

       Unix printers   2nd  

disaster recovery  

Discard Eligibility (DE)   2nd  

discovery

       Bluetooth   2nd  

Discrete MultiTone (DMT)   2nd   3rd   4th   5th   6th  

diskless workstations

       BOOTP   2nd  

               client/server exchanges (DHCP)   2nd   3rd   4th   5th   6th   7th   8th   9th  

               customizing DHCP   2nd   3rd   4th   5th  

               DHCP   2nd   3rd   4th   5th   6th   7th  

               downloading operating systems   2nd  

               options fields   2nd   3rd   4th   5th  

               packet formats   2nd   3rd   4th   5th  

               request/reply mechanisms   2nd   3rd   4th  

DISP (Directory Information Shadowing Protocol)  

display filters   2nd   3rd  

disposing

       hardware and media

               as physical network security measure   2nd  

distance limitations, 802.11b networking  

distance-vector protocols

       RIP (Routing Information Protocol)   2nd   3rd   4th   5th   6th  

               router updates   2nd   3rd   4th  

               scalability   2nd  

               version 2   2nd   3rd  

distinguished name (DN)   2nd   3rd   4th  

Distributed Coordination Function (DCF)  

distributed denial-of-service attack  

distributed denial-of-service attacks   2nd   3rd   4th  

Distributed File System (DFS)   2nd   3rd   4th   5th   6th  

       roots

               adding links   2nd   3rd  

               creating   2nd   3rd  

DIT (Directory Information Tree)   2nd  

ditroff command  

DLC (Data Link Control)   2nd   3rd  

DLCI (Data Link Connection Identifier)  

DLCI (data Link Connection Identifier)  

DLT (Digital Linear Tape)  

DM1 packet  

DMT (Discrete MultiTone)   2nd   3rd   4th   5th   6th  

DMZ (demilitarized zone)   2nd  

DN (distinguished name)   2nd   3rd   4th  

DNS   2nd  

        clients

               configuring   2nd   3rd   4th   5th   6th   7th  

       DHCP   2nd   3rd   4th   5th   6th  

       resource records   2nd   3rd   4th  

       servers

               files  

       TCP/IP   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd  

       Unix

               configuring   2nd  

       Windows 2000

               installing  

       WINS

               interaction  

DNS (Domain Name Service)  

DNS (Domain Name System)   2nd   3rd   4th   5th  

       Active Directory  

       DDNS (Dynamic DNS).   [See DDNS]

DOCSIS (Data Over Cable Service Interface Specification)   2nd  

Document Properties   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       Windows 2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

documentation   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       installation   2nd  

       maintenance   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       RFCs.   [See RFCs]

       tetsing   2nd  

       tools

               online/paper   2nd  

               spreadsheets/word processors   2nd   3rd   4th  

documents

       IEEE 802

               obtaining  

       Internet Draft  

       Network Connection Policy   2nd  

       networks

               mapping   2nd   3rd  

               planning   2nd  

       upgrades

               closing  

DOD (Department of Defense)  

Domain Admins user groups  

domain component (DC)  

domain local groups  

Domain Name Service (DNS)  

Domain Name System (DNS)   2nd   3rd   4th  

Domain Name Sytem.   [See DNS]

domainname command (NIS)   2nd  

domains

       administrative rights

               delegating   2nd   3rd  

       arranging   2nd  

       BIND (Berkeley Internet Name Domain)  

       broadcast  

       centralized/decentralized management   2nd   3rd  

       collisions   2nd   3rd  

       collison domains

               segmenting   2nd  

       computers

               adding   2nd  

       controllers   2nd   3rd  

       local domain groups  

       master domain models   2nd   3rd   4th   5th  

       models

               Active Directory   2nd  

       namespaces   2nd  

       resource  

       top-level   2nd  

       trees

               Active Directory   2nd   3rd   4th  

               partitioning Active Directory   2nd  

       users

               creating   2nd   3rd  

       Windows NT

               controllers   2nd   3rd  

               creating trust relationships   2nd   3rd   4th   5th  

               interdomain trust relationships   2nd   3rd   4th  

               models   2nd   3rd   4th   5th   6th   7th   8th  

               replication between controllers   2nd   3rd   4th  

               workgroups   2nd   3rd   4th  

DON'T command  

door locks (physical network security measure)   2nd  

DOP (Directory Operational Binding Management Protocol)  

down time

       preventing   2nd  

downloading operating systems (BOOTP)   2nd  

downtime, scheduling  

drafts

       IEEE

               creating  

drawings

       wiring  

drivers

       high-impedance  

       low-impedance  

       software  

               NDIS (Network Driver Interface Specification)   2nd  

               ODI (Open Data-Link Interface)   2nd  

               packet Drivers   2nd  

       Windows NT

               selecting   2nd  

DSA (Directory System Agent)  

DSAP (Destination Service Access Point)  

DSL (digital subscriber line)  

DSL (Digital Subscriber Line)   2nd  

       CAP (Carrierless Amplitiude Phase)  

       comparing cable modems   2nd   3rd   4th   5th  

       DMT (Discrete MultiTone)   2nd   3rd   4th   5th  

       DSLAM (DSL Access Multiplexer)  

       PSTN   2nd   3rd  

       xDSL   2nd   3rd  

DSL Access Multiplexer (DSLAM)   2nd  

DSLAM (DSL Access Multiplexer)  

DSLM (DSL Access Multiplexer)  

DSP (Directory System Protocol)  

DSSS (Direct Sequence Spread Spectrum)  

DSU (data service unit)   2nd  

DT (Data Terminal)  

DTE (data terminal equipment)   2nd  

DUA (Directory User Agent)   2nd  

dual-mode Accent Point   2nd  

dual-redundant network controllers   2nd  

Dump Event Log (DUMPEL.EXE)  

DUMPEL.EXE (Dump Event Log)  

Dynamic DNS.   [See DDNS]

Dynamic Host Configuration Protocol (DHCP)   2nd   3rd   4th  

dynamic packet filters   2nd  

dynamic updates

       configuring   2nd   3rd   4th  

Категории