TCP/IPv6 Configuration and Management Manual (G06.24+)
Glossary
HP NonStop TCP/IPv6 Configuration and Management Manual—524523-008
Glossary-22
token ring
token ring. 1)The token access procedure used on a network with a sequential or ring
topology. (2) A data link level protocol designed to transfer data over ring-oriented
LANs. The token ring technique is based on the use of a particular bit pattern called a
token that circulates around the ring when all stations are idle.
token type. In DSM programmatic interfaces, the part of a DSM token code that identifies
the data type and length of the token value. The token type and the token number
together form the token code.
token value. In DSM programmatic interfaces, the value assigned to a DSM token.
Trivial File Transfer Protocol (TFTP). The Internet standard protocol for file transfer with
minimal capability and minimal overhead. TFTP depends only on the unreliable,
connectionless datagram delivery service (UDP), so it can be used on machines like
diskless workstations that keep such software in ROM and use it to bootstrap
themselves.
tunneling. The technique of encapsulating IPv6 packets within IPv4 so that they can be
carried across IPv4 routing infrastructures.
UDP. See User Datagram Protocol (UDP).
unicast address. An identifier for a single interface. A packet sent to a unicast address is
delivered to the interface identified by that address.
User Datagram Protocol (UDP). The Internet standard protocol that allows an application
program on one machine to send a datagram to an application program on another
machine. UDP uses the Internet Protocol to deliver datagrams. Conceptually, the
important difference between UDP and IP is that UDP messages include a protocol
port number, allowing the sender to distinguish among multiple destinations
(application programs) on the remote machine. In practice, UDP also includes a
checksum over the data being sent.
valid address. A preferred or deprecated address. A valid address might appear as the
source or destination address of a packet, and the internet routing system is expected
to deliver packets sent to a valid address to their intended recipients.
valid lifetime. The length of time an address remains in the valid state (for example, the
time until invalidation). The valid lifetime must be greater than or equal to the preferred
lifetime. When the valid lifetime expires, the address becomes invalid.
wait mode. In the Guardian operating system, the mode in which the called procedure waits
for the completion of an I/O operation before returning a condition code to the caller.
Compare nowait mode.
WAN. See wide area network (WAN).
WAN manager process. The WAN manager process starts and manages the WAN
subsystem objects including the ConMgr and WANBoot processes.