HP rp3440 HP Integrity and HP 9000 iLO MP Operations Guide, Fifth Edition - Page 134
Network, Interface Card, Network mask, Options, Out-of-band, System, Management, Port Number, Protocol - diagram
View all HP rp3440 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 134 highlights
N Network Interface Card (NIC) Network mask Node O Options Out-of-band System Management P Port Port Number POST Protocol Proxy R Remote System S Schema SNMP SSH SSL Subnet An internal circuit board or card that connects a workstation or server to a networked device. A number used by software to separate a local subnet address from the rest of an Internet Protocol (IP) address. An addressable point or device on a network. A node can connect a computing system, a terminal, or various peripheral devices to the network. Options control command verb behavior. Server management capability that is enabled when the operating system network drivers or the server are not functioning properly. The location (socket) where Transmission Control Protocol/Internet Protocol (TCP/IP) connections are made. Web servers traditionally use port 80, the File Transfer Protocol (FTP) uses port 21, and telnet uses port 23. A port enables a client program to specify a particular server program in a computer on a network. When a server program is started initially, it binds to its designated port number. Any client that wants to use that server must send a request to bind to the designated port number. A number that specifies an individual Transmission Control Protocol/Internet Protocol (TCP/IP) application on a host machine, providing a destination for transmitted data. Power-On Self-Test. The series of steps that the host system CPU performs following power-on. Steps include testing memory, initializing peripherals, and executing option ROMs. Following POST, the host ROM passes control to the installed operating system. A set of rules that describes how systems or devices on a network exchange information. A mechanism whereby one system acts on behalf of another system in responding to protocol requests. A system other than the one on which the user is working. Definitions that describe what type of information can be stored as entries in the directory. When information that does not match the schema is stored in the directory, clients attempting to access the directory might be unable to display the proper results. Schemas come in many forms, such as a text file, information in a repository, or diagrams. Simple Network Management Protocol. A set of protocols for managing complex networks. Secure Shell. A UNIX shell program and network protocol that enables secure and encrypted login and execution of commands on a remote system over a non-secure network. Secure Sockets Layer. A protocol that enables client-to-server communication on a network to be encrypted for privacy. SSL uses a key exchange method to establish an environment in which all data exchanged is encrypted with a cipher and hashed to protect it from eavesdropping and alteration. SSL creates a secure connection between a web server and a web client. Hypertext Transfer Protocol Secure (HTTPS) uses SSL. A working scheme that divides a single logical network into smaller physical networks to simplify routing. The subnet is the portion of an Internet Protocol (IP) address that identifies a block of host IDs. 134 Glossary