DAD
Duplicate Address
Detection. IPv6 automatically uses this process to ensure that no duplicate IP addresses
exist.
For more information, see Duplicate Address
Detection in the ExtremeXOS 22.3 User Guide.
dBm
An abbreviation for the
power ratio in decibels (dB) of the measured power referenced to one milliwatt.
DCB
DCB (Data Center Bridging) is a set of IEEE 802.1Q extensions to standard Ethernet, that provide an
operational framework for unifying Local Area Networks (LAN), Storage Area Networks (SAN) and
Inter-Process Communication (IPC) traffic between switches and endpoints onto a single
transport layer.
DCBX
The Data Center
Bridging eXchange protocol is used by DCB devices to exchange DCB configuration information
with directly connected peers.
default encapsulation
mode
In
STP, default encapsulation allows you to
specify the type of BPDU encapsulation to use for all ports added to a given STPD, not just to
one individual port. The encapsulation modes are:
- 802.1d—This mode is used for backward compatibility with previous
STP versions and for compatibility with third-party switches using IEEE standard
802.1d.
- EMISTP—Extreme Multiple Instance Spanning Tree Protocol (EMISTP)
mode is an extension of STP that allows a physical port to belong to multiple STPDs by
assigning the port to multiple VLANs.
- PVST+—This mode implements PVST+ in compatibility with third-party
switches running this version of STP.
designated port
In
STP, the designated port provides the
shortest path connection to the root bridge for the attached LAN segment. Each LAN segment has
only one designated port.
destination
address
The IP or MAC address
of the device that is to receive the packet.
Device Manager
The Device Manager is
an Extreme Networks-proprietary process that runs on every node and is responsible for
monitoring and controlling all of the devices in the system. The Device Manager is useful for
system redundancy.
device server
A specialized,
network-based hardware device designed to perform a single or specialized set of server
functions. Print servers, terminal servers, remote access servers, and network time servers
are examples of device servers.
DF
Don't fragment bit.
This is the don't fragment bit carried in the flags field of the IP header that indicates that
the packet should not be fragmented. The remote host will return ICMP notifications if the
packet had to be split anyway, and these are used in
MTU discovery.
DHCP
Dynamic Host
Configuration Protocol. DHCP allows network administrators to centrally manage and automate
the assignment of IP addresses on the corporate network. DHCP sends a new IP address when a
computer is plugged into a different place in the network. The protocol supports static or
dynamic IP addresses and can dynamically reconfigure networks in which there are more
computers than there are available IP addresses.
DiffServ
Differentiated Services. Defined in RFC 2474 and 2475, DiffServ is an
architecture for implementing scalable service differentiation in the Internet. Each IP
header has a DiffServ (DS) field, formerly known as the Type of Service (TOS) field. The
value in this field defines the QoS
priority the packet will have throughout the network by dictating the forwarding treatment
given to the packet at each node.
DiffServ is a flexible architecture that allows for either end-to-end
QoS or intra-domain QoS by implementing complex classification and mapping functions at the
network boundary or access points. In the Extreme Networks implementation, you can configure
the desired QoS by replacing or mapping the values in the DS field to egress queues that are
assigned varying priorities and bandwidths.
directory agent
(DA)
A method of organizing
and locating the resources (such as printers, disk drives, databases, e-mail directories, and
schedulers) in a network. Using SLP, networking applications can discover the existence,
location and configuration of networked devices. With Service Location Protocol, client
applications are 'User Agents' and services are advertised by 'Service Agents'.
The User Agent issues a multicast 'Service Request' (SrvRqst) on behalf
of the client application, specifying the services required. The User Agent will receive a
Service Reply (SrvRply) specifying the location of all services in the network which satisfy
the request.
For larger networks, a third entity, called a 'Directory Agent', receives
registrations from all available Service Agents. A User Agent sends a unicast request for
services to a Directory Agent (if there is one) rather than to a Service Agent.
(SLP
version 2, RFC 2608, updating RFC 2165)
diversity antenna and
receiver
The AP has two
antennae. Receive diversity refers to the ability of the AP to provide better service to a
device by receiving from the user on which ever of the two antennae is receiving the cleanest
signal. Transmit diversity refers to the ability of the AP to use its two antenna to transmit
on a specific antenna only, or on a alternate antennae. The antennae are called diversity
antennae because of this capability of the pair.
DNS
Domain Name Server.
This system is used to translate domain names to IP addresses. Although the Internet is based
on IP addresses, names are easier to remember and work with. All these names must be
translated back to the actual IP address and the DNS servers do so.
domain
In
CFM, a maintenance domain is the network, or
part of the network, that belongs to a single administration for which connectivity faults are
managed.
DoS attack
Denial of Service
attacks occur when a critical network or computing resource is overwhelmed so that legitimate
requests for service cannot succeed. In its simplest form, a DoS attack is indistinguishable
from normal heavy traffic. ExtremeXOS software has configurable parameters that allow you to
defeat DoS attacks. For more information, see DoS Protection in the
ExtremeXOS 22.3 User Guide.
DR
Designated router. In
OSPF, the DR generates an LSA for the multi-access network
and has other special responsibilities in the running of the protocol. The DR is elected by
the OSPF protocol.
DSSS
Direct-Sequence Spread
Spectrum. A transmission technology used in Local Area Wireless Network (LAWN) transmissions
where a data signal at the sending station is combined with a higher data rate bit sequence,
or chipping code, that divides the user data according to a spreading ratio. The chipping code
is a redundant bit pattern for each bit that is transmitted, which increases the signal's
resistance to interference. If one or more bits in the pattern are damaged during
transmission, the original data can be recovered due to the redundancy of the transmission.
(Compare with
FHSS.)
DTIM
DTIM delivery traffic
indication message (in 802.11 standard).
dynamic WEP
The IEEE introduced the
concept of user-based authentication using per-user encryption keys to solve the scalability
issues that surrounded static WEP. This resulted in the 802.1x standard, which makes use of
the IETF's Extensible Authentication Protocol (EAP), which was originally designed for user
authentication in dial-up networks. The 802.1x standard supplemented the EAP protocol with a
mechanism to send an encryption key to a Wireless AP. These encryption keys are used as
dynamic WEP keys, allowing traffic to each individual user to be encrypted using a separate
key.