INDEX 559
Data Encryption Standard (DES),
377
Triple, 377
Data flow, 80–81
full-duplex transmission, 81
half-duplex transmission, 80–81
simplex transmission, 80–81
turnaround time, 81
Data flow diagram (DFD), 208
Data flow, in circuits, 80–81
Data link layer, 119–45, 508–10
address, 158
address resolution, 164
internet model, 18
logical link control (LLC)
sublayer, 120
media access control (MAC)
sublayer, 120–22. See also
individual entry
message transmission using, 21
OSI model, 16
Data link protocols, 131–36
asynchronous transmission,
132–33
point-to-point protocol (PPP),
135–36
synchronous transmission,
133–36
Data over Cable Service Interface
Specification (DOCSIS),
320
Data rate, 104
Data service unit (DSU), 273
Data set, 487
ready, 487
Data signaling/synchronization,
487–88
carrier detect, 488
data terminal ready, 488
request to send and clear to send
signals, 488
transmit data pins, 488
Data storage, 40
Data synchronization, 487–88
Data terminal equipment (DTE),
482
Data terminal ready, 488
Data transmission
DSL and, 87
full-duplex, 81
half-duplex, 80
simplex, 80–81
Database servers, 47, 199, 207
Datagram, 281
DDoS agent, 352
DDoS handler, 352
De facto standards, 22–23
De juro standards, 22–23
acceptance stage, 23
identification of choices stage, 23
specification stage, 23
Decryption, 374
Dedicated circuits, 79
Dedicated-circuit networks, 273–7 9
basic architecture, 273–78
distributed star architecture, 274
dedicated-circuit services, 278
mesh architecture, 276
ring architecture, 274
star architecture, 275
T carrier services, 278–79
Dedicated-circuit services, 269
Dedicated-server LANs, 199–200
Dedicated server networks,
199–200
Deep Space Communications
Centers (DSCCs), 85
Deliverables
cost assessment, 423–24
needs analysis and, 417–18
technology design, 420–21
Delphi team, 350
Demilitarized zone (DMZ), 366
Denial-of-service attack (DoS), 352
inside, 355
Denial-of-service (DoS) attack,
352–55
DDoS agent, 352
DDoS handler, 352
distributed, 353
Denial-of-service protection,
352–55
Dense WDM (DWDM), 85
Design, network, 408–3 9
Designated port, 495
Designated router, 169
Desirable requirements, 417
Desktop management, 391, 454
Desktop videoconferencing, 61–62
Destination box, 508
Destination port address, 153
Destruction, of data, 342
Detection
anomaly, 387
error, 126
misuse, 387
Detective controls, 343
Device failure protection, 356–57
Device management software, 424
Device memory, 430–31
Device performance, improving,
260
Devices, managed, 424, 459
Digital circuit, 78
Digital data, 78
analog transmission, 100–01
digital transmission of, 98–99
translating from analog, 105–06
Digital signatures, 378
Digital subscriber line (DSL), 87,
318–20
access multiplexer, 319
architecture, 318–19
asymmetric, 319
asymmetric DSL (ADSL), 319
data transmission, 318
modem, 318
types of, 319–20
Digital transmission, 98–99
Digital transmission of analog data,
105–08
adaptive differential pulse code
modulation (ADPCM), 108
voice data transmission
by instant messenger, 108
by telephones, 106–08
voice over internet protocol
(VoIP), 108
Digital transmission of digital data,
95–100
coding scheme, 95–97
double current signaling, 98
ethernet transmitting data,
99–100
Manchester encoding, 100
polarity, 97
transmission modes, 97–98
Unicode, 96
Direct current (DC), 97
Directional antennas, 205