S

 

Schema

Definitions that describe what type of information can be stored as entries in the directory.

 

When information that does not match the schema is stored in the directory, clients attempting

 

to access the directory may be unable to display the proper results. Schemas come in many

 

forms, such as a text file, information in a repository, or diagrams.

Serial Console

A terminal connected to the serial port on the service processor. A serial console is used to

 

configure the system to perform other administrative tasks.

SM CLP

Server Management Command Line Protocol (SM CLP). SM CLP specification defines a

 

user-friendly command line protocol to manipulate CIM instances defined by the SM profiles

 

specification.

SMASH

System Management Architecture for Server Hardware (SMASH). An initiative by the

 

Distributed Management Task Force (DMTF) that encompasses specifications (SM CLP, SM

 

ME Addressing, SM Profiles) that address the interoperable manageability requirements of

 

small-to large-scale heterogeneous computer environments.

SNMP

Simple Network Management Protocol. A set of protocols for managing complex networks.

SSH

Secure Shell. A UNIX shell program and network protocol that enables secure and encrypted

 

log in and execution of commands on a remote system over an insecure network.

SSL

Secure Sockets Layer. A protocol that enables client-to-server communication on a network to

 

be encrypted for privacy. SSL uses a key exchange method to establish an environment in which

 

all data exchanged is encrypted with a cipher and hashed to protect it from eavesdropping and

 

alteration. SSL creates a secure connection between a web server and a web client. Hypertext

 

Transfer Protocol Secure (HTTPS) uses SSL.

Subnet

A working scheme that divides a single logical network into smaller physical networks to

 

simplify routing. The subnet is the portion of an Internet Protocol (IP) address that identifies

 

a block of host IDs.

Subnet Mask

A bit mask used to select bits from an Internet address for subnet addressing. The mask is 32

 

bits long, and selects the network portion of the Internet address and one or more bits of the

 

local portion. Also called an address mask.

System Event Log

A log that provides nonvolatile storage for system events that are logged autonomously by the

(SEL)

service processor, or directly with event messages sent from the host.

T

 

Target

A target is the implicitly or explicitly identified managed element that a command is directed

 

toward. Command targets specify managed elements in the system. Targets follow the SM

 

addressing specification.

Target Address

The target addressing scheme provides an easy-to-use method to accurately address CIM

 

objects. The target address term of the CLP syntax in this architecture is extensible. The

 

addressing scheme provides a unique target for CLP commands. The scheme is finite for parsing

 

target names, and unique for unambiguous access to associated instance information needed

 

to support association traversal rooted at the MAP AdminDomain instance.

Target Address

This entity is responsible for discovering and enumerating the managed elements within the

Scheme

local domain, for maintaining the addressing and naming structure of the local domain, and

Resolution

coordinating this information with the operation invocation engine.

Service

 

Telnet

A telecommunications protocol providing specifications for emulating a remote computer

 

terminal so that one can access a distant computer and function online using an interface that

 

appears to be part of the user's local system.

U

 

Universal Serial

An external bus standard that supports data transfer rates of 450 Mb/s (USB 2.0). A USB port

Bus (USB)

connects devices such as mouse pointers, keyboards, and printers, to the computer system.

192 Glossary

Page 192
Image 192
HP Integrity iLO 2 MP 5991-6005 manual Snmp