HP rp3440 HP Integrity and HP 9000 iLO MP Operations Guide, Fifth Edition - Page 134

Network, Interface Card, Network mask, Options, Out-of-band, System, Management, Port Number, Protocol - diagram

Page 134 highlights

N Network Interface Card (NIC) Network mask Node O Options Out-of-band System Management P Port Port Number POST Protocol Proxy R Remote System S Schema SNMP SSH SSL Subnet An internal circuit board or card that connects a workstation or server to a networked device. A number used by software to separate a local subnet address from the rest of an Internet Protocol (IP) address. An addressable point or device on a network. A node can connect a computing system, a terminal, or various peripheral devices to the network. Options control command verb behavior. Server management capability that is enabled when the operating system network drivers or the server are not functioning properly. The location (socket) where Transmission Control Protocol/Internet Protocol (TCP/IP) connections are made. Web servers traditionally use port 80, the File Transfer Protocol (FTP) uses port 21, and telnet uses port 23. A port enables a client program to specify a particular server program in a computer on a network. When a server program is started initially, it binds to its designated port number. Any client that wants to use that server must send a request to bind to the designated port number. A number that specifies an individual Transmission Control Protocol/Internet Protocol (TCP/IP) application on a host machine, providing a destination for transmitted data. Power-On Self-Test. The series of steps that the host system CPU performs following power-on. Steps include testing memory, initializing peripherals, and executing option ROMs. Following POST, the host ROM passes control to the installed operating system. A set of rules that describes how systems or devices on a network exchange information. A mechanism whereby one system acts on behalf of another system in responding to protocol requests. A system other than the one on which the user is working. Definitions that describe what type of information can be stored as entries in the directory. When information that does not match the schema is stored in the directory, clients attempting to access the directory might be unable to display the proper results. Schemas come in many forms, such as a text file, information in a repository, or diagrams. Simple Network Management Protocol. A set of protocols for managing complex networks. Secure Shell. A UNIX shell program and network protocol that enables secure and encrypted login and execution of commands on a remote system over a non-secure network. Secure Sockets Layer. A protocol that enables client-to-server communication on a network to be encrypted for privacy. SSL uses a key exchange method to establish an environment in which all data exchanged is encrypted with a cipher and hashed to protect it from eavesdropping and alteration. SSL creates a secure connection between a web server and a web client. Hypertext Transfer Protocol Secure (HTTPS) uses SSL. A working scheme that divides a single logical network into smaller physical networks to simplify routing. The subnet is the portion of an Internet Protocol (IP) address that identifies a block of host IDs. 134 Glossary

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140

N
Network
Interface Card
(NIC)
An internal circuit board or card that connects a workstation or server to a networked device.
Network mask
A number used by software to separate a local subnet address from the rest of an Internet
Protocol (IP) address.
Node
An addressable point or device on a network. A node can connect a computing system, a
terminal, or various peripheral devices to the network.
O
Options
Options control command verb behavior.
Out-of-band
System
Management
Server management capability that is enabled when the operating system network drivers or
the server are not functioning properly.
P
Port
The location (socket) where Transmission Control Protocol/Internet Protocol (TCP/IP) connections
are made. Web servers traditionally use port 80, the File Transfer Protocol (FTP) uses port 21,
and telnet uses port 23. A port enables a client program to specify a particular server program
in a computer on a network. When a server program is started initially, it binds to its designated
port number. Any client that wants to use that server must send a request to bind to the
designated port number.
Port Number
A number that specifies an individual Transmission Control Protocol/Internet Protocol (TCP/IP)
application on a host machine, providing a destination for transmitted data.
POST
Power-On Self-Test. The series of steps that the host system CPU performs following power-on.
Steps include testing memory, initializing peripherals, and executing option ROMs. Following
POST, the host ROM passes control to the installed operating system.
Protocol
A set of rules that describes how systems or devices on a network exchange information.
Proxy
A mechanism whereby one system acts on behalf of another system in responding to protocol
requests.
R
Remote System
A system other than the one on which the user is working.
S
Schema
Definitions that describe what type of information can be stored as entries in the directory.
When information that does not match the schema is stored in the directory, clients attempting
to access the directory might be unable to display the proper results. Schemas come in many
forms, such as a text file, information in a repository, or diagrams.
SNMP
Simple Network Management Protocol. A set of protocols for managing complex networks.
SSH
Secure Shell. A UNIX shell program and network protocol that enables secure and encrypted
login and execution of commands on a remote system over a non-secure network.
SSL
Secure Sockets Layer. A protocol that enables client-to-server communication on a network to
be encrypted for privacy. SSL uses a key exchange method to establish an environment in which
all data exchanged is encrypted with a cipher and hashed to protect it from eavesdropping and
alteration. SSL creates a secure connection between a web server and a web client. Hypertext
Transfer Protocol Secure (HTTPS) uses SSL.
Subnet
A working scheme that divides a single logical network into smaller physical networks to
simplify routing. The subnet is the portion of an Internet Protocol (IP) address that identifies
a block of host IDs.
134
Glossary