Datagram Authenticated Session Protocol (DASP) is designed to provide an unordered, reliable, secure session for full-duplex datagram exchange that can be implemented for low power wireless networks and low cost devices.
dBase is a relational database management system. dBase II was the first widely used database management system (DBMS) for microcomputers. A major upgrade was released as dBase III, and ported to a wider variety of platforms, adding UNIX, and VMS.
The Datagram Congestion Control Protocol (DCCP) is a message-oriented transport layer protocol. DCCP implements reliable connection setup, teardown, Explicit Congestion Notification (ECN), congestion control, and feature negotiation.
The Device Control Protocol (DCP) is an application level protocol optimized for the integration, monitoring and control of devices on a network. It provides a framework for integrating unconventional network devices attached to networks either directly or as computer periphery.
Distributed Data Management (DDM) is a function of the operating system that allows an application program or user on one system to use database files stored on remote systems. The systems must be connected by a communications network, and the remote systems must also be using DDM. With distributed relational database, information the application requester (AR) needs to connect to a database is provided in the relational database directory.
Domino Domain Monitor database - Remote DB Access Using Secure Sockets
IBM Lotus Domino domain monitoring (DDM) provides one location in the Domino Administrator client that you can use to view the overall status of multiple servers across one or more domains, and then use the information provided by DDM to quickly resolve problems.
Datagram Delivery Protocol (DDP) is a member of the AppleTalk networking protocol suite. It is the network-layer protocol that is responsible for the socket-to-socket delivery of datagrams over the AppleTalk Internet.
DHCP Failover Protocol supports automatic failover from a primary server to its secondary server. The failover mechanism allows the secondary server to perform DHCP actions while the primary is down, or when a network failure prevents the primary and secondary from communicating.
The Dynamic Host Configuration Protocol (DHCP) provides a framework for passing configuration information to hosts on a TCP/IP network. The information given by designated DHCP servers include: IP address, subnet mask and default gateway. A DHCP server usually listens on UDP port 67 and DHCP client usually listens on UDP 68.
DHCPv6 is a network protocol that is used for configuring IPv6 hosts with IP addresses, IP prefixes and/or other configuration required to operate on an IPv6 network. IPv6 hosts can acquire IP addresses using stateless address autoconfiguration, or by using DHCPv6. DHCP tends to be preferred at sites where central management of hosts is valued; stateless autoconfiguration does not require any sort of central management, and is therefore preferable in networks where no management is readily available, such as a typical home network.
A distributed hash table (DHT) is a class of a decentralized distributed system that provides a lookup service similar to a hash table. BitTorrent uses DHT for storing peer contact information for trackerless torrents. In effect, each peer becomes a tracker. The protocol is based on Kademila and is implemented over UDP.
Direct connect is a peer-to-peer file sharing protocol. Clients connect to a main hub that mediates them to other clients in order to download files. The hubs hold a database of clients and files and mediate the clients. Once clients are connected in a P2P manner, they can download files and chat with one another.
DirectPlay is part of Microsoft's DirectX API. It is a network communication library intended for computer game development. DirectPlay features a set of tools that allow players to find game sessions and sites to manage the flow of information between hosts and players. It provides a way for applications to communicate with each other, regardless of the underlying online service or protocol.
DirectPlay is part of Microsoft's DirectX API. DirectPlay is a network communication library intended for computer game development, although its general nature allows it to be used for other purposes.
The Discard Protocol is a service intended for testing, debugging, and measurement purposes. A host sends data to another host that supports the Discard Protocol. The data is simply discarded by the recieving host, and no response is returned.
OSI Directory Service defines a powerful mechanism for storing and retrieving information about objects, and for arranging those objects in a hierarchical structure. Many types of objects and information can be stored in The Directory, including white pages information, application information, service information, etc. The OSI protocol defined to allow access to this information is the Directory Access Protocol (DAP). The DAP, being an OSI application-layer program, is fairly heavy-weight and requires a substantial amount of computing power and coding investment to implement. The DIXIE protocol is designed for use by smaller hosts (e.g., Macintoshes and PCs) that do not have the computing power or necessary software to implement a full OSI protocol stack. The DIXIE protocol is also useful for any Internet application that wants a simple interface to X.500 that requires very little coding investment.
Digital Media Player is an IP-based integrated component of the Cisco Digital Media Suite for Cisco Digital Signs and Cisco Cast. It controls the display and playback of rich digital media, including high-definition live broadcasts or on-demand video, Adobe Flash Player animations, graphics, text tickers, and other web content.DMP is fully manageable as a standalone device; however, as, part of the integrated Cisco Digital Signs and Cisco Cast systems, it is a powerful, customizable digital media publishing endpoint. Using the Cisco Digital Media Manager (DMM), the centralized management system component of the Cisco Digital Media Suite, you can manage the DMP. It supports MPEG,web-content Adobe-Flash player 9 and tickers, live broadcasting and on demand video content. The underlying protocols are FTP (for transferring files), HTTP and HTTPS for browsing, RTP and RTSP for unicast streaming.NBAR2 doesnt support multicast streams, and DMP browsing, therefore the classification is for traffic between DMM and DMP.
The Distributed Network Protocol(DNP) is a set ofcommunications protocolsused between components inprocess automationsystems. Its main use is in utilities such as electric and water companies. Usage in other industries is not common. It was developed for communications between various types ofdata acquisitionand control equipment. It plays a crucial role inSCADAsystems, where it is used by SCADA Master Stations (aka Control Centers),Remote Terminal Units(RTUs), andIntelligent Electronic Devices(IEDs). It is primarily used for communications between a master station and RTUs or IEDs. ICCP, the Inter-Control Center Communications Protocol, is used for inter-master station communications.
DSP3270 was created in 1980 in order to allow bisynchronous (BSC) 3270 terminals to communicate through an X.25 network. A PAD (packet assembler-disassembler) connected to a BSC 3270 type device communicates over the packet switched network with another PAD connected to a host computer. The protocol defines the communication between the two PADs, it is carried above the X.25 level 3 layer and so it could be called a level 4 protocol although it is not compatible with the OSI Transport layer.
Dynamic Source Routing (DSR) is aroutingprotocolforwireless mesh networks. It forms a route on-demand when a transmitting computer requests one, and usessource routinginstead of relying on the routing table at each intermediate device.
The Deception ToolKit (DTK) is a toolkit designed to give defenders a couple of orders of magnitude advantage over attackers. In DTK, the deception is intended to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities.