User`s manual

416
DWS-1008 User’s Manual
D-Link Systems, Inc.
Appendix D - Glossary
DHCP
Dynamic Host Conguration Protocol. A protocol that dynamically assigns IP addresses
to stations, from a centralized server. DHCP is the successor to the Bootstrap Protocol
(BOOTP).
dictionary attack
An attempt to gain illegal access to a computer or network by logging in repeatedly with
passwords that are based on a list of terms in a dictionary.
Dife-Hellman
A key exchange algorithm that was the rst public-key algorithm ever published. Dife-
Hellman can be used anonymously (without authentication).
Diffserv
Differentiated services. An architecture for providing different types or levels of service for
network trafc. Diffserv aggregates ows in the network so that routers and switches need
to distinguish only a relatively small number of aggregated ows, even if those ows contain
thousands or millions of individual ows.
digital certicate
A document containing the name of a user (client) or server, a digital signature, a public key,
and other elements used in authentication and encryption. See also X.509.
digital signature
The result of encrypting a hash of a message or document with a private key. A digital signature
is used to verify the authenticity of the sender and the integrity (unaltered condition) of the
message or document. See also hash.
Digital Signature Algorithm
See DSA.
direct-sequence spread-spectrum
See DSSS.
domain
(1) On the Internet, a set of network addresses that are organized in levels. (2) In Microsoft
Windows NT and Windows 2000, a set of network resources (applications, printers, and so
forth) for a group of users (clients). Clients log into the domain to access the resources, which
can be located on a number of different servers in the network.
DSA
Digital Signature Algorithm. The public-key algorithm used to sign X.509 certicates.