[Contents] [Prev. Chapter] [Index] [Help]

Glossary

absolute pathname

A pathname that begins at the root directory; a pathname that always begins with a slash (/). For example, /usr/bin is an absolute pathname. Also called a full pathname. Contrast with relative pathname. See also pathname

administrator

Also known as a system administrator. The administrator of a UNIX system performs the tasks associated with installing, configuring, managing, and monitoring a UNIX system. See also superuser and root

AdvFS

Advanced File System. A journaled, local file system that provides higher availability and greater flexibility than traditional UNIX file systems. Using transaction journaling, AdvFS recovers file system integrity in seconds, rather than minutes, after an unexpected restart such as a power failure.

AdvFS journaling also provides increased file system integrity. AdvFS provides greater flexibility by allowing filesets (file systems) to share a single storage pool and enabling hard and soft fileset quotas in addition to user and group quotas.

archive

To store programs, data files, text files, and other types of files for safekeeping; a repository for such files.

ATM

Asynchronous Transfer Mode. A telecommunications concept defined by ANSI and ITU standards for carrying voice, data, and video signals on any User-Network Interface (UNI) and well suited for high-speed networking. Information is organized into cells.

base operating system

All mandatory and optional software subsets that are shipped on the first CD-ROM comprise the base operating system.

/bin/csh

The command that invokes the C shell; the name of the executable file that is the shell. See also C shell

BIND

Berkeley Internet Name Domain. A distributed database name lookup service that lets you distribute the host database network wide.

Bourne shell

The command interpreter and interpreted programming language originally developed by Stephen Bourne at Bell Laboratories. See also shell and BSD

BSD

Berkeley Software Distribution. The UNIX software release of the Computer System Research Group of the University of California at Berkeley; the basis for some features of this version of the UNIX system.

C shell

A command interpreter and interpreted programming language developed at the University of California at Berkeley; so named because many of its constructs resemble the equivalent C language constructs. The C shell provides features such as job control and command history recall that are not available in the Bourne shell. See also Bourne shell, shell, and /bin/csh

CDE

Common Desktop Environment. The graphical user interface running on the desktop. CDE is compatible with the X Window System.

CDE front panel

A centrally located window on the CDE desktop containing controls for accessing applications and utilities including workspaces. The Front Panel occupies all workspaces. See also CDE

Classical IP

An environment, described in RFC 1577, that provides a basic means of carrying unicast IP traffic over ATM networks. Hosts that can communicate with each other are grouped into a Logical IP Subnetwork (LIS) and have the same network/subnetwork number and mask.

cluster

A loosely coupled collection of servers that share storage and other resources that make applications and data highly available. A cluster consists of communications media, member systems, peripheral devices, and applications. The systems communicate over a high-performance interconnect. See also cluster member

cluster member

The basic computing resource in a cluster. A member system physically must be connected to a cluster interconnect and at least one shared SCSI bus. The connection manager dynamically determines cluster membership based on communications among cluster members. See also cluster

CPU

Central Processing Unit. The main computational unit in a computer and the one that executes instructions.

current scheduling database

The scheduling database that is controlling the allocation of system resources. See also scheduling database

DHCP

Dynamic host configuration protocol. Enables the automatic assignment of IP addresses to clients on networks from a pool of addresses. The IP address assignment and configuration occurs automatically whenever client systems (workstations and portable computers) attach to a network. See also IP and protocol

DNS

Domain name service. A distributed host name service used by the Internet usually implemented by BIND and WINS.

domain

(1) Any single element of a domain name. For example, given the host name host1.nyc.bigcorp.com: host1, nyc, bigcorp, and com are domains. In this case, host1 is unique, in that it does not have subdomains. (2) Any qualified portion of a domain name. Qualified means that it is fully specified all the way to the root domain. For example, given the host name host1.nyc.bigcorp.com: nyc.bigcorp.com, bigcorp.com, and com, are qualified domains. (3) The domain, and all the subdomains beneath it, down to the leaf nodes of the domain space tree. For example, given nyc.bigcorp.com: nyc.bigcorp.com is the name of the domain, and the domain encompasses all the hosts located in nyc. See also domain name

domain name

(1) A hierarchical (tree-like) naming scheme used by the Internet to uniquely identify a host. The root of the tree is the last element in the name (typically com, edu, org, or a country-code such as US, UK, or FR), and each element of the tree is separated by a period (.). For example, host1.nyc.bigcorp.com. Here, host1 is the unqualified host name and nyc is a domain; in this case, the organization separates things according to geography, (for example, New York City). bigcorp.com is the domain assigned to bigcorp. See also RFC 1034 and RFC 1035. (2) Any host name that utilizes the domain name scheme. (3) The name of a domain. See also domain

DOP

Division of Privileges. A set of tools that lets a system administrator configure privileges for users or groups who usually would not have those privileges. After privileges are configured, the dop command lets a user or group execute an administrative action after proper authentication. See also privilege

Energy Star

A computer-industry standard for the reduction of power consumed by computing equipment.

event

Something that happens that may be of interest either to some part of a local or remote system or to a user.

event management

A facility for communicating event information to interested parties for immediate or later action. An event management system may include storage and retrieval facilities.

EVM

The implementation on this operating system of an event management system. See also event management

EVM client

Any program that processes events through a connection to the EVM daemon. See also event and EVM

FDDI

Fiber distributed data interface. A set of ANSI/ISO standards that define a high-bandwidth (100 Mb/s) general-purpose local area network (LAN). It provides synchronous and asynchronous services between computers and peripheral equipment in a timed-token passing, dual ring of trees configuration. See also LAN

file system

The collection of files and file management structures on a physical or logical mass storage device.

file system layout

The locations of the basic UNIX file systems and swap areas: root (/), /usr, /var, swap1 and swap2. In this version of UNIX, the default file system layout consists of separate / and /usr file systems and a single swap area, swap1. Furthermore, they are all installed on the same disk in the a, g and b partitions, respectively. See also file system

fully qualified host name

A host name containing one or more labels separated by a period. A label is a string, which begins with a letter and contains letters, digits, and hyphens and ends with a letter or a digit. A label can have between 2 and 63 characters, inclusive. A fully qualified host name can have a maximum of 254 characters.

$HOME

An environmental variable containing the absolute pathname of a user's home directory. See also absolute pathname

ICMP

Internet Control Message Protocol. A host-to-host protocol from the Internet Protocol suite that controls errors and operations of the Internet Protocol (IP). See also IP

IP

The network layer protocol for the Internet Protocol (IP) suite. It is a connectionless, best-effort packet delivery service. IP includes the ICMP as an integral part. The IP suite is referred to as TCP/IP because IP is one of the two most fundamental protocols. See also ICMP

IP address

Internet Protocol address. A quantity used to represent a point of attachment in an internet. For IPv4, it is a 32-bit quantity that uses periods (.) in its text form to delineate each portion of the address. For IPv6, it is a 128-bit value that uses colons (:) in its text form to delineate each 16-bit portion of the address. See also IP and DNS

IP switching

Internet Protocol switching. An environment based on the Ipsilon Networks, Inc. reference model in which one or more hosts are connected to an IP Switch through a point-to-point physical connection, with each physical connection as a separate subnet. The environment supports IP traffic only and multicast and broadcast services. See also IP

Korn shell

A command interpreter and interpreted programming language developed by David Korn. The Korn shell (ksh) is semantically an extended version of the Bourne shell, with constructs and commands to implement enhanced features, including job control and command history recall. The POSIX shell is a superset of the Korn shell. See also Bourne shell and shell

LAN

Local Area Network. A group of two or more computer systems (hosts) connected by a transmission medium, such as an Ethernet cable, token ring, or FDDI. Each host is connected to the transmission medium by a hardware interface. A LAN is a data communications network that spans a physically limited area, such as a single office building. It usually is owned by the organization it services and provides high-bandwidth communication over inexpensive media. See also FDDI and network

LAN Emulation

An environment defined by the ATM Forum that groups hosts into an entity called an emulated LAN. The environment identifies hosts through their 48-bit MAC addresses; supports multicast and broadcast services either through point-to-multipoint connections or through a multicast server; and supports any protocol that can operate over an IEEE broadcast LAN. See also LAN

LAT

Local Area Transport. This is a means by which a printer can be connected to a terminal server through the network, provided the server supports LAT protocol. Depending on the LAT server capabilities, the server can support one printer, through a LAT port name, or several printers, one per port, through a LAT service name. In Print Configuration, you can specify whether print requests sent to the LAT terminal server are directed to a specific printer (by specifying a LAT port name) or the next available printer (by specifying a LAT service name).

LMF

License Management Facility. An operating system utility that enables the online management of software license data and allows the use of licensed software.

local host

(1) The computer system to which your terminal is directly connected. (2) In event management, local host is the host on which the event viewer is running. See also event management and remote host

LSM

Logical Storage Manager. LSM is an integrated, host-based disk storage management tool that protects against data loss, improves disk input/output performance, and customizes the disk configuration. LSM builds virtual disks, called volumes, on top of UNIX system disks. A volume is a special device that contains data used by file systems, databases, or other applications. LSM transparently places a volume between a physical disk and an application, which then operates on the volume rather than on the physical disk.

network

Two or more computing systems that are linked for the purpose of exchanging information and sharing resources.

NFS

Network File System. A facility for sharing files between systems through a connection to a network. NFS requires a designated server that exports file systems to one or more designated NFS Clients. Applications can read and write to files on NFS-mounted file systems as though the files were on the local host.

NIS

Network Information Service. A distributed data lookup service for sharing information on a local area network (LAN). NIS lets you coordinate the distribution of database information throughout your networked environment. Formerly named Yellow Pages. See also LAN

NIS master

The NIS server that stores the master copy of the NIS maps for its domain. These are the only maps that can be modified. Each domain has only one master server. See also NIS server, NIS slave

NIS server

An NIS system that maintains a copy of the NIS maps for a domain. There are two types of NIS servers, master and slave. See also NIS, NIS master, NIS slave

NIS slave

An NIS server that stores copies of the NIS master server's NIS maps. Whenever an NIS map is updated on the master server, the master propagates the changes to each slave server in its domain. If the master is unavailable for any reason, the NIS slave servers continue to make the NIS maps available to the NIS clients. See also NIS server, NIS master

NTP

Network Time Protocol. NTP is a time synchronization method used to ensure that the time settings for all machines within a network are synchronized. NTP is usually used for large networks. See also timed.

PAK

Product Authorization Key. (1) A list of essential information about a software license that must be registered in the license database for you to have access to a product. The PAK issuer produces the PAK and delivers it to you, usually as part of your product shipment. (2) A unique set of data used by the LMF to confirm that a product is licensed. See also LMF

pathname

The name of a file, concatenated onto a list of the directories through which access to that file is achieved; hence, the complete name of the file. Absolute pathnames begin at the root directory and are written with an initial slash (for example, /usr/users/test/myfile.txt). Relative pathnames begin at the current working directory and are written without the initial slash (for example, test/myfile.txt).

permissions

The constraints placed on a file to control what the owner, other users, or other groups have permission read, write, or execute. There are three sets of file permissions: those applied to the owner of the file, those applied to the group, and those applied to everyone else, called other. You can change the permissions of files you own by using the chmod command.

privilege

A privilege is associated with users or groups who have been granted the right to execute an action usually reserved for the root user. See also right and DOP

protocol

A set of semantic and syntactic rules that govern communications. A protocol defines how information is delivered, how it is encoded to reach its destination intact, and what path it follows. A protocol can also coordinate the flow of messages and whether or not messages are acknowledged upon receipt.

RAM

Random Access Memory. The working memory of the computer. RAM is the memory used for storing data temporarily while working on it, running application programs, and so on.

relative pathname

A pathname that begins at the user's current working directory; it is written without the initial slash. For example, docs/myfile.txt is a relative pathname. Contrast with absolute pathname. See also pathname

remote host

(1) Any node in a network other than your local node. (2) In event management, the remote host is any host other than the host on which the event viewer is running. See also event management and local host

retrieving client

A client that uses a connection to the EVM daemon to retrieve events from the log files. See also EVM client

right

Authorizes a user to perform an action on the system. Rights apply to the system as a whole and are different from permissions, which apply to specific objects. See also permissions, privilege, and DOP

root

(1) The login name for the system administrator (superuser). (2) The name applied to the topmost directory in the UNIX system's tree-like file structure; hence, the beginning of an absolute pathname. The root directory is represented in pathnames by an initial slash (/); a reference to the root directory itself consists of a single slash. See also superuser

scheduling class

A collection of users, groups, process groups, process IDs, and sessions that belongs to a scheduling database. Each scheduling class is allocated a percentage of CPU time. See also scheduling database, CPU

scheduling database

A collection of scheduling classes. Each class is allocated a percentage of system resources. See also scheduling class, current scheduling database

shell

A program that interprets commands entered by users to invoke programs and calls for system resources as needed. See also C shell, Korn shell, and Bourne shell

superuser

A user possessing privileges to override the usual restrictions on file access, process control, and so forth. See also root and administrator

swap space

A temporary disk space used to hold modified memory from an idle or low priority process in order to reclaim the physical memory that the process is using. See also swapping

swapping

A process that transfers the contents of an area of main storage to or from auxiliary storage. See also swap space

TCP/IP

Transmission Control Protocol/Internet Protocol. The two fundamental protocols of the Internet Protocol suite. Also an acronym that is frequently used to refer to the Internet Protocol suite. TCP provides for the reliable transfer of data, while IP transmits the data through the network in the form of datagrams.

timed

The timed daemon. A time synchronization method used to ensure that the time settings for all servers within a network are synchronized. It is usually used for small networks. See also NTP

UFS

UNIX File System. The standard file system type that is characterized by a hierarchical structure, the ability to create and delete files, dynamic growth of files, protection of file data, and the treatment of peripheral devices. See also file system

virtual memory

A combination of physical memory and physical disk space that can be larger than the physical memory. The virtual memory subsystem controls the allocation of pages in physical memory and keeps track of the pages that have been paged out.

WINS

Windows Internet Naming Service. Software that resolves personal computer (PC) host names to IP addresses. See also DNS and IP address

WLS

Worldwide Language Support. WLS software subsets provide support for various native languages and countries. Installing WLS software subsets enables software developers to develop internationalized software and lets users work in their native language.

xdm

X Display Manager. Manages a collection of X displays, which may be on the local host or remote servers. XDM prompts the user for a user name and password and then starts the user's X session.