HP rp3440 HP Integrity and HP 9000 iLO MP Operations Guide, Fifth Edition - Page 135

Subnet Mask, System Event Log, Telnet, Universal Serial, Bus USB, User Account, User Name

Page 135 highlights

Subnet Mask System Event Log (SEL) A bit mask used to select bits from an Internet address for subnet addressing. The mask is 32 bits long, and selects the network portion of the Internet address and one or more bits of the local portion. Also called an address mask. A log that provides nonvolatile storage for system events that are logged autonomously by the service processor, or directly with event messages sent from the host. T Telnet A telecommunications protocol providing specifications for emulating a remote computer terminal so that one can access a distant computer and function online using an interface that appears to be part of the user's local system. U Universal Serial Bus (USB) User Account User Name User-Friendly instance Path (UFiP) User-Friendly instance Tag (UFiT) An external bus standard that supports data transfer rates of 450 Mb/s (USB 2.0). A USB port connects devices, such as mouse pointers, keyboards, modems, and printers, to the computer system. A record of essential user information that is stored on the system. Each user who accesses a system has a user account. A combination of letters, and possibly numbers, that identifies a user to the system. A unique path to an instance formed by concatenating the UFiTs of each instance from the root instance to the terminating instance. The intervening '/' between each UFiT represents an address association. A unique instance tag within the scope of the target instance's containment class. A UFiT is created by adding a non-zero positive-integer suffix to the target instance's UFcT. V VPN Virtual private network. A network that is constructed using public wires (the Internet) to connect nodes. These systems use encryption and other security mechanisms to ensure only authorized users can access the network and that the data cannot be intercepted. 135

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140

Subnet Mask
A bit mask used to select bits from an Internet address for subnet addressing. The mask is 32
bits long, and selects the network portion of the Internet address and one or more bits of the
local portion. Also called an
address mask
.
System Event Log
(SEL)
A log that provides nonvolatile storage for system events that are logged autonomously by the
service processor, or directly with event messages sent from the host.
T
Telnet
A telecommunications protocol providing specifications for emulating a remote computer
terminal so that one can access a distant computer and function online using an interface that
appears to be part of the user's local system.
U
Universal Serial
Bus (USB)
An external bus standard that supports data transfer rates of 450 Mb/s (USB 2.0). A USB port
connects devices, such as mouse pointers, keyboards, modems, and printers, to the computer
system.
User Account
A record of essential user information that is stored on the system. Each user who accesses a
system has a user account.
User Name
A combination of letters, and possibly numbers, that identifies a user to the system.
User-Friendly
instance Path
(UFiP)
A unique path to an instance formed by concatenating the UFiTs of each instance from the root
instance to the terminating instance. The intervening ‘/’ between each UFiT represents an address
association.
User-Friendly
instance Tag
(UFiT)
A unique instance tag within the scope of the target instance’s containment class. A UFiT is
created by adding a non-zero positive-integer suffix to the target instance’s UFcT.
V
VPN
Virtual private network. A network that is constructed using public wires (the Internet) to
connect nodes. These systems use encryption and other security mechanisms to ensure only
authorized users can access the network and that the data cannot be intercepted.
135