Diagnosis Guide
- A
- ACL
- Access Control List. A list that defines who has permission to
access certain services; that is, for whom a server may perform certain
tasks. This is usually a list of principals with the type of access
assigned to each.
- adapter
- An adapter is a mechanism for attaching parts. For example, an
adapter could be a part that electrically or physically connects a device to a
computer or to another device. In the SP system, network connectivity
is supplied by various adapters, some optional, that can provide connection to
I/O devices, networks of workstations, and mainframe networks.
Ethernet, FDDI, token-ring, HiPPI, SCSI, FCS, and ATM are examples of adapters
that can be used as part of an SP system.
- address
- A character or group of characters that identifies a register, a device, a
particular part of storage, or some other data source or destination.
- AFS
- A distributed file system that provides authentication services as part of
its file system creation.
- AIX
- Abbreviation for Advanced Interactive Executive, IBM's licensed
version of the UNIX operating system. AIX is particularly suited to
support technical computing applications, including high function graphics and
floating point computations.
- API
- Application Programming Interface. A set of programming functions
and routines that provide access between the Application layer of the OSI
seven-layer model and applications that want to use the network. It is
a software interface.
- application
- The use to which a data processing system is put; for example, a
payroll application, an airline reservation application.
- application data
- The data that is produced using an application program.
- ARP
- Address Resolution Protocol.
- ATM
- Asynchronous Transfer Mode. (See TURBOWAYS 100 ATM
Adapter.)
- authentication
- The process of validating the identity of either a user of a service or
the service itself. The process of a principal proving the authenticity
of its identity.
- authorization
- The process of obtaining permission to access resources or perform
tasks. In SP security services, authorization is based on the principal
identifier. The granting of access rights to a principal.
- authorization file
- A type of ACL (access control list) used by the IBM AIX remote commands
and the IBM PSSP Sysctl and Hardmon components.
- B
- batch processing
- (1) The processing of data or the accomplishment of jobs accumulated in
advance in such a manner that each accumulation thus formed is processed or
accomplished in the same run. (2) The processing of data accumulating
over a period of time. (3) Loosely, the execution of computer programs
serially. (4) Computer programs executed in the background.
- BOS
- The AIX Base Operating System.
- C
- call home function
- The ability of a system to call the IBM support center and open a PMR to
have a repair scheduled.
- CDE
- Common Desktop Environment. A graphical user interface for
UNIX.
- charge feature
- An optional feature for either software or hardware for which there is a
charge.
- CLI
- Command Line Interface.
- client
- (1) A function that requests services from a server and makes them
available to the user. (2) A term used in an environment to identify a
machine that uses the resources of the network.
- CMI
- Centralized Management Interface provides a series of SMIT menus and
dialogues used for defining and querying the SP system configuration.
- Concurrent Virtual Shared Disk
- A virtual shared disk that can be concurrently accessed by more than one
server.
- connectionless
- A communication process that takes place without first establishing a
connection.
- connectionless network
- A network in which the sending logical node must have the address of the
receiving logical node before information interchange can begin. The
packet is routed through nodes in the network based on the destination address
in the packet. The originating source does not receive an
acknowledgment that the packet was received at the destination.
- control workstation
- A single point of control allowing the administrator or operator to
monitor and manage the SP system using the IBM AIX Parallel System Support
Programs.
- credentials
- A protocol message, or part thereof, containing a ticket and an
authenticator supplied by a client and used by a server to verify the
client's identity.
- css
- Communication subsystem.
- D
- daemon
- A process, not associated with a particular user, that performs
system-wide functions such as administration and control of networks,
execution of time-dependent activities, line printer spooling and so
forth.
- DASD
- Direct Access Storage Device. Storage for input/output data.
- DCE
- Distributed Computing Environment.
- DFS
- distributed file system. A subset of the IBM Distributed Computing
Environment.
- DNS
- Domain Name Service. A hierarchical name service which maps high
level machine names to IP addresses.
- E
- Error Notification Object
- An object in the SDR that is matched with an error log entry. When
an error log entry occurs that matches the Notification Object, a
user-specified action is taken.
- ESCON
- Enterprise Systems Connection. The ESCON channel connection allows
the RS/6000 to communicate directly with a host System/390; the host
operating system views the system unit as a control unit.
- Ethernet
- (1) Ethernet is the standard hardware for TCP/IP local area networks in
the UNIX marketplace. It is a 10-megabit per second baseband type LAN
that allows multiple stations to access the transmission medium at will
without prior coordination, avoids contention by using carrier sense and
deference, and resolves contention by collision detection (CSMA/CD).
(2) A passive coaxial cable whose interconnections contain devices or
components, or both, that are all active. It uses CSMA/CD technology to
provide a best-effort delivery system.
- Ethernet network
- A baseband LAN with a bus topology in which messages are broadcast on a
coaxial cabling using the carrier sense multiple access/collision detection
(CSMA/CD) transmission method.
- event
- In Event Management, the notification that an expression evaluated to
true. This evaluation occurs each time an instance of a resource
variable is observed.
- expect
- Programmed dialogue with interactive programs.
- expression
- In Event Management, the relational expression between a resource variable
and other elements (such as constants or the previous value of an instance of
the variable) that, when true, generates an event. An example of an
expression is X < 10 where X represents the resource variable
IBM.PSSP.aixos.PagSp.%totalfree (the
percentage of total free paging space). When the expression is true,
that is, when the total free paging space is observed to be less than 10%, the
Event Management subsystem generates an event to notify the appropriate
application.
- F
- failover
- Also called fallover, the sequence of events when a primary or server
machine fails and a secondary or backup machine assumes the primary
workload. This is a disruptive failure with a short recovery
time.
- fall back
- Also called fallback, the sequence of events when a primary or server
machine takes back control of its workload from a secondary or backup
machine.
- FDDI
- Fiber Distributed Data Interface.
- FFDC
- First Failure Data Capture.
- Fiber Distributed Data Interface (FDDI)
- An American National Standards Institute (ANSI) standard for
100-megabit-per-second LAN using optical fiber cables. An FDDI local
area network (LAN) can be up to 100 km (62 miles) and can include up to 500
system units. There can be up to 2 km (1.24 miles) between
system units and concentrators.
- file
- A set of related records treated as a unit, for example, in stock control,
a file could consist of a set of invoices.
- file name
- A CMS file identifier in the form of 'filename filetype
filemode' (like: TEXT DATA A).
- file server
- A centrally located computer that acts as a storehouse of data and
applications for numerous users of a local area network.
- File Transfer Protocol (FTP)
- The Internet protocol (and program) used to transfer files between
hosts. It is an application layer protocol in TCP/IP that uses TELNET
and TCP protocols to transfer bulk-data files between machines or
hosts.
- First Failure Data Capture (FFDC)
- A set of utilities used for recording persistent records of failures and
significant software incidents. It provides a means of associating
failures to one another, thus allowing software to link effects of a failure
to their causes and thereby facilitating discovery of the root cause of a
failure.
- foreign host
- Any host on the network other than the local host.
- FTP
- File transfer protocol.
- G
- gateway
- An intelligent electronic device interconnecting dissimilar networks and
providing protocol conversion for network compatibility. A gateway
provides transparent access to dissimilar networks for nodes on either
network. It operates at the session presentation and application
layers.
- H
- HACMP
- High Availability Cluster Multi-Processing for AIX.
- HACWS
- High Availability Control Workstation function, based on HACMP, provides
for a backup control workstation for the SP system.
- Hardware Management Console (HMC)
- The IBM Hardware Management Console for pSeries is an
installation and service support processor that runs only the HMC
software. For an IBM pSeries 690 server to run the PSSP
software, an HMC is required with a network connection to the PSSP control
workstation . The HMC provides the following functions for the p690
server:
- Creating and maintaining a multiple partition environment
- Detecting, reporting, and storing changes in hardware conditions
- Acting as a focal point for service representatives to determine an
appropriate service strategy
- Hashed Shared Disk (HSD)
- The data striping device for the IBM Virtual Shared Disk. The
device driver lets application programs stripe data across physical disks in
multiple IBM Virtual Shared Disks, thus reducing I/O bottlenecks.
- help key
- In the SP graphical interface, the key that gives you access to the SP
graphical interface help facility.
- High Availability Cluster Multi-Processing
- An IBM facility to cluster nodes or components to provide high
availability by eliminating single points of failure.
- HiPPI
- High Performance Parallel Interface. RS/6000 units can attach to a
HiPPI network as defined by the ANSI specifications. The HiPPI channel
supports burst rates of 100 Mbps over dual simplex cables; connections
can be up to 25 km in length as defined by the standard and can be extended
using third-party HiPPI switches and fiber optic extenders.
- home directory
- The directory associated with an individual user.
- host
- A computer connected to a network, and providing an access method to that
network. A host provides end-user services.
- HMC
- Hardware Management Console.
- I
- instance vector
- Obsolete term for resource identifier.
- Intermediate Switch Board
- Switches mounted in the switch expansion frame.
- Internet
- A specific inter-network consisting of large national backbone networks
such as APARANET, MILNET, and NSFnet, and a myriad of regional and campus
networks all over the world. The network uses the TCP/IP protocol
suite.
- Internet Protocol (IP)
- (1) A protocol that routes data through a network or interconnected
networks. IP acts as an interface between the higher logical layers and
the physical network. This protocol, however, does not provide error
recovery, flow control, or guarantee the reliability of the physical
network. IP is a connectionless protocol. (2) A protocol used to
route data from its source to it destination in an Internet
environment.
- IP address
- A 32-bit address assigned to devices or hosts in an IP internet that maps
to a physical address. The IP address is composed of a network and host
portion.
- ISB
- Intermediate Switch Board.
- K
- Kerberos
- A service for authenticating users in a network environment.
- kernel
- The core portion of the UNIX operating system which controls the resources
of the CPU and allocates them to the users. The kernel is
memory-resident, is said to run in "kernel mode" and is protected from
user tampering by the hardware.
- Kernel Low-Level Application Programming Interface (KLAPI)
- KLAPI provides transport service for communication using the SP
Switch.
- L
- LAN
- (1) Acronym for Local Area Network, a data network located on the
user's premises in which serial transmission is used for direct data
communication among data stations. (2) Physical network technology that
transfers data a high speed over short distances. (3) A network in
which a set of devices is connected to another for communication and that can
be connected to a larger network.
- LAPI
- Low-level Communication API.
- local host
- The computer to which a user's terminal is directly connected.
- log database
- A persistent storage location for the logged information.
- log event
- The recording of an event.
- log event type
- A particular kind of log event that has a hierarchy associated with
it.
- logging
- The writing of information to persistent storage for subsequent analysis
by humans or programs.
- Low-level Communication API (LAPI)
- A low-level (low overhead) message passing protocol that uses a one-sided
active message style interface to transfer messages between processes.
LAPI is an IBM proprietary interface designed to exploit the SP switch
adapters.
- M
- mask
- To use a pattern of characters to control retention or elimination of
portions of another pattern of characters.
- menu
- A display of a list of available functions for selection by the
user.
- Message Passing Interface (MPI)
- An industry standard message passing protocol that typically uses a
two-sided send-receive model to transfer messages between
processes.
- Motif
- The graphical user interface for OSF, incorporating the X Window
System. Also called OSF/Motif.
- MPI
- Message Passing Interface.
- MTBF
- Mean time between failure. This is a measure of reliability.
- MTTR
- Mean time to repair. This is a measure of serviceability.
- N
- naive application
- An application with no knowledge of a server that fails over to another
server. Client to server retry methods are used to reconnect.
- network
- An interconnected group of nodes, lines, and terminals. A network
provides the ability to transmit data to and receive data from other systems
and users.
- Network Interface Module (NIM)
- A process used by the Topology Services daemon to monitor each network
interface.
- NFS
- Network File System. NFS allows different systems (UNIX or
non-UNIX), different architectures, or vendors connected to the same network,
to access remote files in a LAN environment as though they were local
files.
- NIM
- (1) Network Installation Management is provided with AIX to install AIX on
the nodes. (2) Network Interface Module is a process used by the
Topology Services daemon to monitor each network interface.
- NIM client
- An AIX system installed and managed by a NIM master. NIM supports
three types of clients:
- Standalone
- Diskless
- Dataless
- NIM master
- An AIX system that can install one or more NIM clients. An AIX
system must be defined as a NIM master before defining any NIM clients on that
system. A NIM master managers the configuration database containing the
information for the NIM clients.
- NIM object
- A representation of information about the NIM environment. NIM
stores this information as objects in the NIM database. The types of
objects are:
- NIS
- Network Information System.
- node
- In a network, the point where one or more functional units interconnect
transmission lines. A computer location defined in a network.
The SP system can house several different types of nodes for both serial and
parallel processing. These node types can include thin nodes, wide
nodes, 604 high nodes, as well as other types of nodes both internal and
external to the SP frame.
- Node Switch Board
- Switches mounted on frames that contain nodes.
- NSB
- Node Switch Board.
- NTP
- Network Time Protocol.
- O
- ODM
- Object Data Manager. In AIX, a hierarchical object-oriented
database for configuration data.
- P
- parallel environment
- A system environment where message passing or SP resource manager services
are used by the application.
- Parallel Environment
- A licensed IBM program used for message passing applications on the SP or
RS/6000 platforms.
- parallel processing
- A multiprocessor architecture which allows processes to be allocated to
tightly coupled multiple processors in a cooperative processing environment,
allowing concurrent execution of tasks.
- parameter
- (1) A variable that is given a constant value for a specified application
and that may denote the application. (2) An item in a menu for which
the operator specifies a value or for which the system provides a value when
the menu is interpreted. (3) A name in a procedure that is used to
refer to an argument that is passed to the procedure. (4) A particular
piece of information that a system or application program needs to process a
request.
- partition
- See system partition.
- Perl
- Practical Extraction and Report Language.
- perspective
- The primary window for each SP Perspectives application, so called because
it provides a unique view of an SP system.
- pipe
- A UNIX utility allowing the output of one command to be the input of
another. Represented by the | symbol. It is also referred to as
filtering output.
- PMR
- Problem Management Report.
- POE
- Formerly Parallel Operating Environment, now Parallel Environment for
AIX.
- port
- (1) An end point for communication between devices, generally referring to
physical connection. (2) A 16-bit number identifying a particular TCP
or UDP resource within a given TCP/IP node.
- predicate
- Obsolete term for expression.
- Primary node or machine
- (1) A device that runs a workload and has a standby device ready to assume
the primary workload if that primary node fails or is taken out of
service. (2) A node on the switch that initializes, provides diagnosis
and recovery services, and performs other operations to the switch
network. (3) In IBM Virtual Shared Disk function, when physical disks
are connected to two nodes (twin-tailed), one node is designated as the
primary node for each disk and the other is designated the secondary, or
backup, node. The primary node is the server node for IBM Virtual
Shared Disks defined on the physical disks under normal conditions. The
secondary node can become the server node for the disks if the primary node is
unavailable (off-line or down).
- Problem Management Report
- The number in the IBM support mechanism that represents a service incident
with a customer.
- process
- (1) A unique, finite course of events defined by its purpose or by its
effect, achieved under defined conditions. (2) Any operation or
combination of operations on data. (3) A function being performed or
waiting to be performed. (4) A program in operation. For
example, a daemon is a system process that is always running on the
system.
- protocol
- A set of semantic and syntactic rules that defines the behavior of
functional units in achieving communication.
- R
- RAID
- Redundant array of independent disks.
- rearm expression
- In Event Management, an expression used to generate an event that
alternates with an original event expression in the following way: the
event expression is used until it is true, then the rearm expression is used
until it is true, then the event expression is used, and so on. The
rearm expression is commonly the inverse of the event expression (for example,
a resource variable is on or off). It can also be used with the event
expression to define an upper and lower boundary for a condition of
interest.
- rearm predicate
- Obsolete term for rearm expression.
- remote host
- See foreign host.
- resource
- In Event Management, an entity in the system that provides a set of
services. Examples of resources include hardware entities such as
processors, disk drives, memory, and adapters, and software entities such as
database applications, processes, and file systems. Each resource in
the system has one or more attributes that define the state of the
resource.
- resource identifier
- In Event Management, a set of elements, where each element is a name/value
pair of the form name=value, whose values uniquely identify the
copy of the resource (and by extension, the copy of the resource variable) in
the system.
- resource monitor
- A program that supplies information about resources in the system.
It can be a command, a daemon, or part of an application or subsystem that
manages any type of system resource.
- resource variable
- In Event Management, the representation of an attribute of a
resource. An example of a resource variable is
IBM.AIX.PagSp.%totalfree, which represents the
percentage of total free paging space.
IBM.AIX.PagSp specifies the resource name and
%totalfree specifies the resource attribute.
- Restricted Root Access (RRA)
- Restricted root access (RRA) limits the uses of the rsh and
rcp commands within PSSP software. When RRA is enabled, it
restricts root rsh and rcp authorizations from the nodes to
the control workstation, and from one node to another. However, control
workstation to node rsh and rcp access is still
permitted.
- RISC
- Reduced Instruction Set Computing (RISC), the technology for today's
high performance personal computers and workstations, was invented in
1975. Uses a small simplified set of frequently used instructions for
rapid execution.
- rlogin (remote LOGIN)
- A service offered by Berkeley UNIX systems that allows authorized users of
one machine to connect to other UNIX systems across a network and interact as
if their terminals were connected directly. The rlogin software passes
information about the user's environment (for example, terminal type) to
the remote machine.
- RPC
- Acronym for Remote Procedure Call, a facility that a client uses to have a
server execute a procedure call. This facility is composed of a library
of procedures plus an XDR.
- RRA
- Restricted Root Access.
- RSH
- A variant of RLOGIN command that invokes a command interpreter on a remote
UNIX machine and passes the command line arguments to the command interpreter,
skipping the LOGIN step completely. See also rlogin.
- S
- SCSI
- Small Computer System Interface.
- Secondary node
- In IBM Virtual Shared Disk function, when physical disks are connected to
two nodes (twin-tailed), one node is designated as the primary node for each
disk and the other is designated as the secondary, or backup, node. The
secondary node acts as the server node for the IBM Virtual Shared disks
defined on the physical disks if the primary node is unavailable (off-line or
down).
- server
- (1) A function that provides services for users. A machine may run
client and server processes at the same time. (2) A machine that
provides resources to the network. It provides a network service, such
as disk storage and file transfer, or a program that uses such a
service. (3) A device, program, or code module on a network dedicated
to providing a specific service to a network. (4) On a LAN, a data
station that provides facilities to other data stations. Examples are
file server, print server, and mail server.
- shell
- The shell is the primary user interface for the UNIX operating
system. It serves as command language interpreter, programming
language, and allows foreground and background processing. There are
three different implementations of the shell concept: Bourne, C and
Korn.
- Small Computer System Interface (SCSI)
- An input and output bus that provides a standard interface for the
attachment of various direct access storage devices (DASD) and tape drives to
the RS/6000.
- Small Computer Systems Interface Adapter (SCSI Adapter)
- An adapter that supports the attachment of various direct-access storage
devices (DASD) and tape drives to the RS/6000.
- SMIT
- The System Management Interface Toolkit is a set of menu driven utilities
for AIX that provides functions such as transaction login, shell script
creation, automatic updates of object database, and so forth.
- SNMP
- Simple Network Management Protocol. (1) An IP network management
protocol that is used to monitor attached networks and routers. (2) A
TCP/IP-based protocol for exchanging network management information and
outlining the structure for communications among network devices.
- socket
- (1) An abstraction used by Berkeley UNIX that allows an application to
access TCP/IP protocol functions. (2) An IP address and port number
pairing. (3) In TCP/IP, the Internet address of the host computer on
which the application runs, and the port number it uses. A TCP/IP
application is identified by its socket.
- standby node or machine
- A device that waits for a failure of a primary node in order to assume the
identity of the primary node. The standby machine then runs the
primary's workload until the primary is back in service.
- subnet
- Shortened form of subnetwork.
- subnet mask
- A bit template that identifies to the TCP/IP protocol code the bits of the
host address that are to be used for routing for specific subnetworks.
- subnetwork
- Any group of nodes that have a set of common characteristics, such as the
same network ID.
- subsystem
- A software component that is not usually associated with a user
command. It is usually a daemon process. A subsystem will
perform work or provide services on behalf of a user request or operating
system request.
- SUP
- Software Update Protocol.
- switch capsule
- A group of SP frames consisting of a switched frame and its companion
non-switched frames.
- Sysctl
- Secure System Command Execution Tool. An authenticated
client/server system for running commands remotely and in parallel.
- syslog
- A BSD logging system used to collect and manage other subsystem's
logging data.
- System Administrator
- The user who is responsible for setting up, modifying, and maintaining the
SP system.
- system partition
- A group of nonoverlapping nodes on a switch chip boundary that act as a
logical SP system.
- T
- tar
- Tape ARchive, is a standard UNIX data archive utility for storing data on
tape media.
- Tcl
- Tool Command Language.
- TclX
- Tool Command Language Extended.
- TCP
- Acronym for Transmission Control Protocol, a stream communication protocol
that includes error recovery and flow control.
- TCP/IP
- Acronym for Transmission Control Protocol/Internet Protocol, a suite of
protocols designed to allow communication between networks regardless of the
technologies implemented in each network. TCP provides a reliable
host-to-host protocol between hosts in packet-switched communications networks
and in interconnected systems of such networks. It assumes that the
underlying protocol is the Internet Protocol.
- Telnet
- Terminal Emulation Protocol, a TCP/IP application protocol that allows
interactive access to foreign hosts.
- ticket
- An encrypted protocol message used to securely pass the identity of a user
from a client to a server.
- Tk
- Tcl-based Tool Kit for X Windows.
- TMPCP
- Tape Management Program Control Point.
- token-ring
- (1) Network technology that controls media access by passing a token
(special packet or frame) between media-attached machines. (2) A
network with a ring topology that passes tokens from one attaching device
(node) to another. (3) The IBM Token-Ring LAN connection allows the
RS/6000 system unit to participate in a LAN adhering to the IEEE 802.5
Token-Passing Ring standard or the ECMA standard 89 for Token-Ring, baseband
LANs.
- transaction
- An exchange between the user and the system. Each activity the
system performs for the user is considered a transaction.
- transceiver (transmitter-receiver)
- A physical device that connects a host interface to a local area network,
such as Ethernet. Ethernet transceivers contain electronics that apply
signals to the cable and sense collisions.
- transfer
- To send data from one place and to receive the data at another
place. Synonymous with move.
- transmission
- The sending of data from one place for reception elsewhere.
- TURBOWAYS 100 ATM Adapter
- An IBM high-performance, high-function intelligent adapter that provides
dedicated 100 Mbps ATM (asynchronous transfer mode) connection for
high-performance servers and workstations.
- U
- UDP
- User Datagram Protocol.
- UNIX operating system
- An operating system developed by Bell Laboratories that features
multiprogramming in a multiuser environment. The UNIX operating system
was originally developed for use on minicomputers, but has been adapted for
mainframes and microcomputers. Note: The AIX operating
system is IBM's implementation of the UNIX operating system.
- user
- Anyone who requires the services of a computing system.
- User Datagram Protocol (UDP)
- (1) In TCP/IP, a packet-level protocol built directly on the Internet
Protocol layer. UDP is used for application-to-application programs
between TCP/IP host systems. (2) A transport protocol in the Internet
suite of protocols that provides unreliable, connectionless datagram
service. (3) The Internet Protocol that enables an application
programmer on one machine or process to send a datagram to an application
program on another machine or process.
- user ID
- A nonnegative integer, contained in an object of type uid_t, that
is used to uniquely identify a system user.
- V
- Virtual Shared Disk, IBM
- The function that allows application programs executing at different nodes
of a system partition to access a raw logical volume as if it were local at
each of the nodes. In actuality, the logical volume is local at only
one of the nodes (the server node).
- W
- workstation
- (1) A configuration of input/output equipment at which an operator
works. (2) A terminal or microcomputer, usually one that is connected
to a mainframe or to a network, at which a user can perform
applications.
- X
- X Window System
- A graphical user interface product.
[ Top of Page | Previous Page | Next Page | Table of Contents | Index ]