HP Integrity and HP 9000 iLO MP Operations Guide, Fifth Edition

N
Network
Interface Card
(NIC)
An internal circuit board or card that connects a workstation or server to a networked device.
Network mask A number used by software to separate a local subnet address from the rest of an Internet
Protocol (IP) address.
Node An addressable point or device on a network. A node can connect a computing system, a
terminal, or various peripheral devices to the network.
O
Options Options control command verb behavior.
Out-of-band
System
Management
Server management capability that is enabled when the operating system network drivers or
the server are not functioning properly.
P
Port The location (socket) where Transmission Control Protocol/Internet Protocol (TCP/IP) connections
are made. Web servers traditionally use port 80, the File Transfer Protocol (FTP) uses port 21,
and telnet uses port 23. A port enables a client program to specify a particular server program
in a computer on a network. When a server program is started initially, it binds to its designated
port number. Any client that wants to use that server must send a request to bind to the
designated port number.
Port Number A number that specifies an individual Transmission Control Protocol/Internet Protocol (TCP/IP)
application on a host machine, providing a destination for transmitted data.
POST Power-On Self-Test. The series of steps that the host system CPU performs following power-on.
Steps include testing memory, initializing peripherals, and executing option ROMs. Following
POST, the host ROM passes control to the installed operating system.
Protocol A set of rules that describes how systems or devices on a network exchange information.
Proxy A mechanism whereby one system acts on behalf of another system in responding to protocol
requests.
R
Remote System A system other than the one on which the user is working.
S
Schema Definitions that describe what type of information can be stored as entries in the directory.
When information that does not match the schema is stored in the directory, clients attempting
to access the directory might be unable to display the proper results. Schemas come in many
forms, such as a text file, information in a repository, or diagrams.
SNMP Simple Network Management Protocol. A set of protocols for managing complex networks.
SSH Secure Shell. A UNIX shell program and network protocol that enables secure and encrypted
login and execution of commands on a remote system over a non-secure network.
SSL Secure Sockets Layer. A protocol that enables client-to-server communication on a network to
be encrypted for privacy. SSL uses a key exchange method to establish an environment in which
all data exchanged is encrypted with a cipher and hashed to protect it from eavesdropping and
alteration. SSL creates a secure connection between a web server and a web client. Hypertext
Transfer Protocol Secure (HTTPS) uses SSL.
Subnet A working scheme that divides a single logical network into smaller physical networks to
simplify routing. The subnet is the portion of an Internet Protocol (IP) address that identifies
a block of host IDs.
134 Glossary