A pathname that begins at the root directory; a pathname that always begins with a slash (/).
For example,
/usr/bin
is an absolute pathname.
Also called a full pathname.
Contrast with
relative pathname.
See also
pathname
Also known as a system administrator. The administrator of a UNIX system performs the tasks associated with installing, configuring, managing, and monitoring a UNIX system. See also superuser and root
Advanced File System. A journaled, local file system that provides higher availability and greater flexibility than traditional UNIX file systems. Using transaction journaling, AdvFS recovers file system integrity in seconds, rather than minutes, after an unexpected restart such as a power failure.
AdvFS journaling also provides increased file system integrity. AdvFS provides greater flexibility by allowing filesets (file systems) to share a single storage pool and enabling hard and soft fileset quotas in addition to user and group quotas.
To store programs, data files, text files, and other types of files for safekeeping; a repository for such files.
Asynchronous Transfer Mode. A telecommunications concept defined by ANSI and ITU standards for carrying voice, data, and video signals on any User-Network Interface (UNI) and well suited for high-speed networking. Information is organized into cells.
All mandatory and optional software subsets that are shipped on the first CD-ROM comprise the base operating system.
The command that invokes the C shell; the name of the executable file that is the shell. See also C shell
Berkeley Internet Name Domain. A distributed database name lookup service that lets you distribute the host database network wide.
The command interpreter and interpreted programming language originally developed by Stephen Bourne at Bell Laboratories. See also shell and BSD
Berkeley Software Distribution. The UNIX software release of the Computer System Research Group of the University of California at Berkeley; the basis for some features of this version of the UNIX system.
A command interpreter and interpreted programming language developed at the University of California at Berkeley; so named because many of its constructs resemble the equivalent C language constructs. The C shell provides features such as job control and command history recall that are not available in the Bourne shell. See also Bourne shell, shell, and /bin/csh
Common Desktop Environment. The graphical user interface running on the desktop. CDE is compatible with the X Window System.
A centrally located window on the CDE desktop containing controls for accessing applications and utilities including workspaces. The Front Panel occupies all workspaces. See also CDE
An environment, described in RFC 1577, that provides a basic means of carrying unicast IP traffic over ATM networks. Hosts that can communicate with each other are grouped into a Logical IP Subnetwork (LIS) and have the same network/subnetwork number and mask.
A loosely coupled collection of servers that share storage and other resources that make applications and data highly available. A cluster consists of communications media, member systems, peripheral devices, and applications. The systems communicate over a high-performance interconnect. See also cluster member
The basic computing resource in a cluster. A member system physically must be connected to a cluster interconnect and at least one shared SCSI bus. The connection manager dynamically determines cluster membership based on communications among cluster members. See also cluster
Central Processing Unit. The main computational unit in a computer and the one that executes instructions.
The scheduling database that is controlling the allocation of system resources. See also scheduling database
Dynamic host configuration protocol. Enables the automatic assignment of IP addresses to clients on networks from a pool of addresses. The IP address assignment and configuration occurs automatically whenever client systems (workstations and portable computers) attach to a network. See also IP and protocol
Domain name service. A distributed host name service used by the Internet usually implemented by BIND and WINS.
(1) Any single element of a domain name.
For example, given the host name
host1.nyc.bigcorp.com
:
host1
,
nyc
,
bigcorp
, and
com
are domains.
In this case,
host1
is unique, in that it does not have subdomains.
(2) Any qualified portion of a domain name.
Qualified means that it is fully specified all the way to the root domain.
For example, given the host name
host1.nyc.bigcorp.com
:
nyc.bigcorp.com
,
bigcorp.com
, and
com
, are qualified domains.
(3) The domain, and all the subdomains beneath it, down to the leaf nodes of the domain space tree.
For example, given
nyc.bigcorp.com
:
nyc.bigcorp.com
is the name of the domain, and the domain encompasses all the hosts located in
nyc
.
See also
domain name
(1) A hierarchical (tree-like) naming scheme used by the Internet to uniquely identify a host.
The root of the tree is the last element in the name (typically
com
,
edu
,
org
, or a country-code such as
US
,
UK
, or
FR
), and each element of the tree is separated by a period (.).
For example,
host1.nyc.bigcorp.com
.
Here,
host1
is the unqualified host name and
nyc
is a domain; in this case, the organization separates things according to geography, (for example, New York City).
bigcorp.com
is the domain assigned to
bigcorp
.
See also RFC 1034 and RFC 1035.
(2) Any host name that utilizes the domain name scheme.
(3) The name of a domain.
See also
domain
Division of Privileges.
A set of tools that lets a system administrator configure privileges for users or groups who usually would not have those privileges.
After privileges are configured, the
dop
command lets a user or group execute an administrative action after proper authentication.
See also
privilege
A computer-industry standard for the reduction of power consumed by computing equipment.
Something that happens that may be of interest either to some part of a local or remote system or to a user.
A facility for communicating event information to interested parties for immediate or later action. An event management system may include storage and retrieval facilities.
The implementation on this operating system of an event management system. See also event management
Any program that processes events through a connection to the EVM daemon. See also event and EVM
Fiber distributed data interface. A set of ANSI/ISO standards that define a high-bandwidth (100 Mb/s) general-purpose local area network (LAN). It provides synchronous and asynchronous services between computers and peripheral equipment in a timed-token passing, dual ring of trees configuration. See also LAN
The collection of files and file management structures on a physical or logical mass storage device.
The locations of the basic UNIX file systems and swap areas: root (/
),
/usr
,
/var
,
swap1
and
swap2
.
In this version of UNIX, the default file system layout consists of separate
/
and
/usr
file systems and a single swap area,
swap1
.
Furthermore, they are all installed on the same disk in the
a
,
g
and
b
partitions, respectively.
See also
file system
A host name containing one or more labels separated by a period. A label is a string, which begins with a letter and contains letters, digits, and hyphens and ends with a letter or a digit. A label can have between 2 and 63 characters, inclusive. A fully qualified host name can have a maximum of 254 characters.
An environmental variable containing the absolute pathname of a user's home directory. See also absolute pathname
Internet Control Message Protocol. A host-to-host protocol from the Internet Protocol suite that controls errors and operations of the Internet Protocol (IP). See also IP
The network layer protocol for the Internet Protocol (IP) suite. It is a connectionless, best-effort packet delivery service. IP includes the ICMP as an integral part. The IP suite is referred to as TCP/IP because IP is one of the two most fundamental protocols. See also ICMP
Internet Protocol address. A quantity used to represent a point of attachment in an internet. For IPv4, it is a 32-bit quantity that uses periods (.) in its text form to delineate each portion of the address. For IPv6, it is a 128-bit value that uses colons (:) in its text form to delineate each 16-bit portion of the address. See also IP and DNS
Internet Protocol switching. An environment based on the Ipsilon Networks, Inc. reference model in which one or more hosts are connected to an IP Switch through a point-to-point physical connection, with each physical connection as a separate subnet. The environment supports IP traffic only and multicast and broadcast services. See also IP
A command interpreter and interpreted programming language developed by David Korn. The Korn shell (ksh) is semantically an extended version of the Bourne shell, with constructs and commands to implement enhanced features, including job control and command history recall. The POSIX shell is a superset of the Korn shell. See also Bourne shell and shell
Local Area Network. A group of two or more computer systems (hosts) connected by a transmission medium, such as an Ethernet cable, token ring, or FDDI. Each host is connected to the transmission medium by a hardware interface. A LAN is a data communications network that spans a physically limited area, such as a single office building. It usually is owned by the organization it services and provides high-bandwidth communication over inexpensive media. See also FDDI and network
An environment defined by the ATM Forum that groups hosts into an entity called an emulated LAN. The environment identifies hosts through their 48-bit MAC addresses; supports multicast and broadcast services either through point-to-multipoint connections or through a multicast server; and supports any protocol that can operate over an IEEE broadcast LAN. See also LAN
Local Area Transport. This is a means by which a printer can be connected to a terminal server through the network, provided the server supports LAT protocol. Depending on the LAT server capabilities, the server can support one printer, through a LAT port name, or several printers, one per port, through a LAT service name. In Print Configuration, you can specify whether print requests sent to the LAT terminal server are directed to a specific printer (by specifying a LAT port name) or the next available printer (by specifying a LAT service name).
License Management Facility. An operating system utility that enables the online management of software license data and allows the use of licensed software.
(1) The computer system to which your terminal is directly connected. (2) In event management, local host is the host on which the event viewer is running. See also event management and remote host
Logical Storage Manager. LSM is an integrated, host-based disk storage management tool that protects against data loss, improves disk input/output performance, and customizes the disk configuration. LSM builds virtual disks, called volumes, on top of UNIX system disks. A volume is a special device that contains data used by file systems, databases, or other applications. LSM transparently places a volume between a physical disk and an application, which then operates on the volume rather than on the physical disk.
Two or more computing systems that are linked for the purpose of exchanging information and sharing resources.
Network File System. A facility for sharing files between systems through a connection to a network. NFS requires a designated server that exports file systems to one or more designated NFS Clients. Applications can read and write to files on NFS-mounted file systems as though the files were on the local host.
Network Information Service. A distributed data lookup service for sharing information on a local area network (LAN). NIS lets you coordinate the distribution of database information throughout your networked environment. Formerly named Yellow Pages. See also LAN
The NIS server that stores the master copy of the NIS maps for its domain. These are the only maps that can be modified. Each domain has only one master server. See also NIS server, NIS slave
An NIS system that maintains a copy of the NIS maps for a domain. There are two types of NIS servers, master and slave. See also NIS, NIS master, NIS slave
An NIS server that stores copies of the NIS master server's NIS maps. Whenever an NIS map is updated on the master server, the master propagates the changes to each slave server in its domain. If the master is unavailable for any reason, the NIS slave servers continue to make the NIS maps available to the NIS clients. See also NIS server, NIS master
Network Time Protocol. NTP is a time synchronization method used to ensure that the time settings for all machines within a network are synchronized. NTP is usually used for large networks. See also timed.
Product Authorization Key. (1) A list of essential information about a software license that must be registered in the license database for you to have access to a product. The PAK issuer produces the PAK and delivers it to you, usually as part of your product shipment. (2) A unique set of data used by the LMF to confirm that a product is licensed. See also LMF
The name of a file, concatenated onto a list of the directories through which access to that file is achieved; hence, the complete name of the file.
Absolute pathnames begin at the root directory and are written with an initial slash (for example,
/usr/users/test/myfile.txt
).
Relative pathnames begin at the current working directory and are written without the initial slash (for example,
test/myfile.txt
).
The constraints placed on a file to control what the owner, other users, or other groups have permission read, write, or execute.
There are three sets of file permissions: those applied to the owner of the file, those applied to the group, and those applied to everyone else, called
other
.
You can change the permissions of files you own by using the
chmod
command.
A privilege is associated with users or groups who have been granted the right to execute an action usually reserved for the
root
user.
See also
right
and
DOP
A set of semantic and syntactic rules that govern communications. A protocol defines how information is delivered, how it is encoded to reach its destination intact, and what path it follows. A protocol can also coordinate the flow of messages and whether or not messages are acknowledged upon receipt.
Random Access Memory. The working memory of the computer. RAM is the memory used for storing data temporarily while working on it, running application programs, and so on.
A pathname that begins at the user's current working directory; it is written without the initial slash.
For example,
docs/myfile.txt
is a relative pathname.
Contrast with
absolute pathname.
See also
pathname
(1) Any node in a network other than your local node. (2) In event management, the remote host is any host other than the host on which the event viewer is running. See also event management and local host
A client that uses a connection to the EVM daemon to retrieve events from the log files. See also EVM client
Authorizes a user to perform an action on the system. Rights apply to the system as a whole and are different from permissions, which apply to specific objects. See also permissions, privilege, and DOP
(1) The login name for the system administrator (superuser). (2) The name applied to the topmost directory in the UNIX system's tree-like file structure; hence, the beginning of an absolute pathname. The root directory is represented in pathnames by an initial slash (/); a reference to the root directory itself consists of a single slash. See also superuser
A collection of users, groups, process groups, process IDs, and sessions that belongs to a scheduling database. Each scheduling class is allocated a percentage of CPU time. See also scheduling database, CPU
A collection of scheduling classes. Each class is allocated a percentage of system resources. See also scheduling class, current scheduling database
A program that interprets commands entered by users to invoke programs and calls for system resources as needed. See also C shell, Korn shell, and Bourne shell
A user possessing privileges to override the usual restrictions on file access, process control, and so forth. See also root and administrator
A temporary disk space used to hold modified memory from an idle or low priority process in order to reclaim the physical memory that the process is using. See also swapping
A process that transfers the contents of an area of main storage to or from auxiliary storage. See also swap space
Transmission Control Protocol/Internet Protocol. The two fundamental protocols of the Internet Protocol suite. Also an acronym that is frequently used to refer to the Internet Protocol suite. TCP provides for the reliable transfer of data, while IP transmits the data through the network in the form of datagrams.
The
timed
daemon.
A time synchronization method used to ensure that the time settings for all servers within a network are synchronized.
It is usually used for small networks.
See also
NTP
UNIX File System. The standard file system type that is characterized by a hierarchical structure, the ability to create and delete files, dynamic growth of files, protection of file data, and the treatment of peripheral devices. See also file system
A combination of physical memory and physical disk space that can be larger than the physical memory. The virtual memory subsystem controls the allocation of pages in physical memory and keeps track of the pages that have been paged out.
Windows Internet Naming Service. Software that resolves personal computer (PC) host names to IP addresses. See also DNS and IP address
Worldwide Language Support. WLS software subsets provide support for various native languages and countries. Installing WLS software subsets enables software developers to develop internationalized software and lets users work in their native language.
X Display Manager. Manages a collection of X displays, which may be on the local host or remote servers. XDM prompts the user for a user name and password and then starts the user's X session.