This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
Please send any feedback about the terms and definitions on this site to email@example.com.
See node port.
See North America.
See next available byte.
See negative acknowledgment reply.
See node abnormal condition program.
See negative acknowledgment character.
During EGL generation, a name that is placed in the output source file instead of a name that was in the EGL source code. In most cases, the original name is aliased because it was not valid in the target generation language.
A security mechanism that is used by Internet protocols over TCP/IP and SSL. During name-and-password authentication, the client sends a text password to the server. The server verifies the identity of the client by confirming that the password that was sent matches the password that is stored on the server.
Name Binding Protocol (NBP)
In AppleTalk networks, a protocol that provides name translation function from the AppleTalk entity (resource) name (character string) into an AppleTalk IP address (16-bit number) on the transport layer.
- A descriptive name that is given to a value and can be used in a filter in place of a value.
- In RPG, a name representing a specific value that does not change during the running of the program.
- A pipe that an application opens by name in order to write data into or read data from the pipe. Using a named pipe facilitates communication between a sending process and a receiving process.
- A type of interprocess communication that permits message data streams to pass between peer processes, such as between a client and a server.
named row data type
A row data type created with the CREATE ROW TYPE statement that has a declared name and inheritance properties and can be used to construct a typed table. See also row data type.
See predefined set.
A collection of styles that users can apply to other data in a file. Styles stored in a named style can include number format, typeface, type size, underlining, bold, italics, lines, colors, and alignment.
A process that cleans and standardizes name information to correct possible errors and transpositions and to enable optimal matching and linking between entities. See also data quality management.
Any meaningful element in a name that can be separated from the rest of the name. Common name parts include first name (or given name), middle name, last name (or surname), and generation. See also name token.
An inseparable unit that consists of a name stem and any affixes that are associated with that name stem. Some name phrases may be made up of multiple stems, as in a Chinese name like Mei-Hui or an English name like Mary-Anne. One or more name phrases can be combined to create a name field. See also name field, name stem, name token.
In a Tivoli environment, a name service consisting of a two-dimensional table that maps resource names to resource identifiers and corresponding information within a Tivoli Management Region.
In Internet communications, the process of mapping a machine name to the corresponding Internet Protocol (IP) address. See also Domain Name System.
See name phrase.
- See domain name server.
- In a Fibre Channel network, the server that contains the worldwide identifiers (WWIDs) of all addressable nodes on the network.
- In networking, the server that converts network names to addresses.
- In WebSphere MQ on UNIX and Linux systems and WebSphere MQ for Windows, the facility that determines which queue manager owns a specified queue.
- In a Distributed Computing Environment (DCE), the service that administers the DCE name space and provides the network binding information that is needed by a client to access the server.
name service handle
In the Distributed Computing Environment Remote Procedure Call (RPC), a reference to the context used by the series of next operations called during a specific name service interface (NSI) search or inquiry.
- In DCE Remote Procedure Call (RPC), a part of the application programming interface (API) of the RPC run time. NSI routines access a name service, such as the Cell Directory Service (CDS), for RPC applications.
- The WebSphere MQ interface to which customer-written or vendor-written programs that resolve queue-name ownership must conform.
- A logical container in which all the names are unique. The unique identifier for an artifact is composed of the namespace and the local name of the artifact.
- The set of all possible names composed of characters from the binder's character set, within which no duplicates are allowed. All external symbols have an assigned name space during binder processing and within program objects.
- For authentication and access control, a configured instance of an authentication provider that allows access to user and group information. In Framework Manager, namespaces uniquely identify query items and query subjects. Different databases are imported into separate namespaces to avoid duplicate names.
- A category used to group similar types of identifiers. See also namespace scope.
- A part of the model in which the names may be defined and used. Within a namespace, each name has a unique meaning.
- In XML and XQuery, a uniform resource identifier (URI) that provides a unique name to associate with the element, attribute, and type definitions in an XML schema or with the names of elements, attributes, types, functions, and errors in XQuery expressions.
- Space reserved by a file system to contain the names of its objects.
- The scope within which a Common Information Model (CIM) schema applies.
A Data Interchange Services object that contains information about an XML namespace and assists the translator in being namespace aware when translating a source document to an XML document.
A user-defined, abstract scope in which identifiers are visible only when the code explicitly includes the desired namespace. See also class scope, global scope, local scope, namespace, scope.
A process that normalizes names by reducing them to the most common derivative or root name. For example, Richard is the most common derivative or root name for Dick, Ricardo, Ricky, Rich, or Ritchie and Mohammad is the most common derivative or root name for Mohamad, Mohamed, Mohammad, or Mohammed. See also data quality management, pipeline.
A node test that consists only of a QName or a wildcard. See also node test.
The smallest indivisible element of a name, which is delineated by white space or punctuation. Name tokens combine to form name phrases and name fields. One name token might contain multiple name parts. Name tokens are either affixes or stems. The exact function of a name token depends upon its placement in the personal name. See also name field, name part, name phrase, name stem, regularization.
In WebSphere MQ on UNIX and Linux systems and WebSphere MQ for Windows, an internal process that changes a queue manager name so that it is unique and valid for the system being used. Externally, the queue manager name remains unchanged.
In SNA network interconnection, the conversion of logical unit names, logon mode table names, and class-of-service names that are used in one network to equivalent names for use in another network. See also alias name.
A 1-byte number from 1 to 255 that the client specifies as the first byte of the resource ID. The name type guarantees uniqueness of names for all resources of that name type. This uniqueness prevents clients from putting more than one resource with the same name and name type out on the resource structure. The resources within the name type can have different data resource types.
An alternative of a specified name that is considered to be equivalent to that name, but which differs from it in its particular external form. Name variants arise from spelling variations (for example, "Geoff" and "Jeff"), nicknames (for example, "Bill" for "William"), abbreviations (for example, "GPE" for "Guadalupe"), translations (for example, "Peter" for "Pierre"), or other processes. See also alternate parse name.
In OSI, an organization that assigns OSI names and addresses--such as abstract syntax names, application context names, network entity titles, and NSAP addresses--to ensure that they are unique.
See Narrowband Advanced Mobile Phone Service.
Narrowband Advanced Mobile Phone Service (NAMPS)
A standard that combines cellular voice processing with digital signaling, increasing the capacity of Advanced Mobile Phone Service (AMPS) systems and adding functionality.
An element of type char that, when processed sequentially, can represent text. See also wide character.
An association among three or more classes. Each instance of the association is an n-tuple of values from the respective classes. See also binary association.
NAS file server
See network-attached storage file server.
NAS file server node
See NAS node.
A client node that is a network-attached storage (NAS) file server. Data for the NAS node is transferred by a NAS file server that is controlled by the network data management protocol (NDMP). A NAS node is also called a NAS file server node.
A relationship between any of the following IP addresses and port numbers: (1) private source IP address and source port number (without NAT), (2) public (NAT) source IP address and public (NAT) source port number, (3) destination IP address and port number (an external network).
In U.S. EBCDIC, the three characters represented by X'7C', X'7B' and X'5B'; these values produce, respectively, the at sign (@), the number sign (#), and the dollar sign ($). On many keyboards and display screens in other countries, these hex values are displayed differently.
National Bureau of Standards (NBS)
See National Institute of Standards and Technology.
National Institute of Standards and Technology (NIST)
A U.S. government agency that supports industry, commerce, scientific institutions, and all branches of U.S. Government in advancing measurement science and developing standards. NIST was formerly known as the National Bureau of Standards (NBS). See also Federal Information Processing Standard.
- A language or dialect spoken by a group of people. This does not include computer programming languages.
- See language load identification.
national language dependent function (NLDF)
Any function of a hardware or software product that must be altered to suit a country, region, or language. Examples include date and time formats, monetary values, keyboards, measurement systems, and character data functions (such as sorting).
National Science Foundation Network (NSFNET)
A collection of local and regional networks in the United States that are connected by a high-speed backbone. NSFNET provides scientists access to a number of supercomputers across the country.
A characteristic of an object that is managed on a specific content server and that is specific to that content server. For example, the key field 'policy num' might be a native attribute in a Content Manager content server, whereas the field policy ID might be a native attribute in a Content Manager OnDemand content server.
An object that is managed on a specific content server and that is comprised of native attributes. For example, Content Manager index classes are native entities comprised of Content Manager key fields.
native file system
A file system that is locally added to the file server and is not added for space management. The hierarchical storage manager (HSM) client does not provide space management services to the file system.
A format of data that is written to a storage pool directly by the server. See also non-native data format.
See local language.
native SQL procedure
An SQL procedure that is processed by converting the procedural statements to a native representation that is stored in the database directory, as is done with other SQL statements. When a native SQL procedure is called, the native representation is loaded from the directory, and DB2 executes the procedure. See also external procedure, external SQL procedure.
native transport address
In MPTN architecture, a transport-user address that has an address type that corresponds to the address type that is used by the transport network underlying the transport user. For example, an SNA name that is being registered within an SNA network.
natural language processing (NLP)
A field of artificial intelligence and linguistics that studies the problems inherent in the processing and manipulation of natural language, with an aim to increase the ability of computers to understand human languages.
The attribute of applications that contain no static external data and do not require additional processing to make them reentrant. See also constructed reentrancy.
See nearest active upstream neighbor.
- The method that is used to locate, retrieve, and move to one or more topics, such as a table of contents, index, or search facility.
- A process that is employed by users to explore a multidimensional database interactively by drilling, rotating and screening, usually using a graphical OLAP Client connected to an OLAP Server.
- An area in the console that is used to locate and launch tasks.
A set of links to other web pages in a website. For example, a navigation bar is typically located across the top or down the side of a page and contains direct links to the major sections within the website.
In CDE, any of the keyboard keys that is used to move the current location of the cursor. These include the arrow keys (with or without the Control key); the Tab key (with or without the Control or Shift keys); the Begin and End keys (with or without the Control key); and the Page Up and Page Down keys.
In the vocabulary, a phrase that associates two business elements. A navigation phrase corresponds to a method that has a return value or an attribute in the business object model (BOM).
A hierarchical structure that is used to access information. See also navigation trail.
- Programmed graphics in the user interface that direct users to specific parts of a Notes database without their having to open views. Navigators usually include hotspots and can do simple actions such as opening a database, document, URL, view, folder, or another navigator.
- A utility that allows the user to navigate catalog components, determine component dependencies, and locate components.
A DFSMSdfp component for implementing, verifying, and maintaining a DFSMS storage management subsystem (SMS) environment in batch mode. NaviQuest is the batch equivalent of Interactive Storage Management Facility (ISMF). It provides batch testing and reporting capabilities that can be used to automatically provide these functions: create test cases in bulk; run many other storage management tasks in batch mode; and use supplied, access method services (ACS), code fragments as models when creating ACS routines.
See Networking Broadband Services.
See Name Binding Protocol.
See National Bureau of Standards.
See Network Computing Architecture.
See Network Communications Control Facility.
See Network Computing Kernel.
See non-colonized name.
NCP connectionless SNA transport (NCST)
A function that enables the network control program (NCP) to transfer TCP/IP frames across the SNA subarea routing network. The NCST session interface provides access to an LU-LU session that can transport Internet Protocol (IP) datagrams to a host that uses the SNA Network Link (SNALINK) or to another NCP that uses NCST.
NCP/EP definition facility (NDF)
A program that is part of System Support Programs (SSP) and that is used to generate a load module for a partitioned emulation program (PEP), a Network Control Program (NCP), or an Emulation Program (EP).
NCP major node
In VTAM, a set of minor nodes representing resources, such as lines and peripheral nodes, controlled by a network control program. See also major node.
NCP/Token-Ring interconnection (NTRI)
An NCP function that enables a communication controller to attach to the IBM Token-Ring Network, and that provides both subarea and peripheral node data link control (DLC) services in the SNA network.
See Network Computing System.
See NCP connectionless SNA transport.
See Network Database System.
See normalized device coordinates.
See NCP/EP definition facility.
See normal disconnected mode.
See Network Data Management Protocol.
See non-defect oriented problem.
See Network Data Representation.
A local, in-process cache in the client Java virtual machine (JVM) that includes a subset of the cached data set that is stored remotely in servers. Data in the near cache can become out of sync with recently changed data in servers.
near field communication (NFC)
A means of communicating data over a wireless connection over a very short distance (several centimeters). NFC chips consume very little power. For example, a smartphone with NFC enabled can communicate with an NFC-enabled movie poster when the user waves the smartphone in front of the poster (as opposed to scanning a tag).
nearline SAS drive
A drive that combines the high capacity data storage technology of a Serial Advanced Technology Attachment (SATA) drive with the benefits of a serial-attached SCSI (SAS) interface for improved connectivity.
near synchronous mode
In high availability disaster recovery, the synchronization mode in which the primary database considers a transaction committed when it receives a message from the standby database confirming that the log data was received and written to the main memory of the standby system. See also synchronization mode.
See node error block.
negative polling limit
For a start-stop (SS) or binary synchronous communication (BSC) terminal, the maximum number of consecutive negative responses to polling that the communication controller accepts before suspending polling operations.
negotiable link station
The capability of a link station to assume either a primary link-station or secondary link-station role and to negotiate with a partner link station during link activation which role it will assume.
negotiated session key
An encryption key that is created at the beginning of the SSL handshake, which determines the key used when encrypting information over an SSL connection. The negotiated session key changes each time a new session is initiated.
- In X.25 communications, the process by which two DTEs establish the packet size, packet window size, and throughput class to be used during a call procedure. See also validation.
- A two-phase process by which an initiating key server communicates with a responding key server. If the negotiations are successful, the key servers establish a dynamic virtual private network (VPN) connection that is between the two agreed-on endpoints. This approach, which is directed by the Internet Key Exchange (IKE) protocols, maintains the secrecy of keys.
- The process of coming to agreement on the terms, conditions, and language of a contract by its parties.
An established process workflow that allows participants to negotiate details of a transaction. This pipeline can be configured to occur anywhere within an existing pipeline. The result from the negotiation is either in the form of acceptance with the potential to update some of the negotiated values or in rejection of the terms of the transaction by one or both of the participants.
In a token-ring network, the process by which each data station identifies the next active station so that all stations that are affected by a hard failure can be informed that a failure has occurred.
See node error program.
To incorporate a structure or structures into a structure of the same kind; for example, one call instruction (nested call) within another call instruction (nesting call) or one subroutine (nested subroutine) within another subroutine (nesting subroutine).
nested accessor environment element (nested ACEE)
An ACEE that contains the security environment (ENVR object) of a daemon nested beneath the security environment of the client to support daemon access to delegated resources. See also delegated resource.
See nested accessor environment element.
A command or group of commands whose processing is conditioned on the evaluation of a preceding or associated command. Nesting is a structured form of branching. In CL programs, the nested command is merged into an associated command. If the nested command is a DO command, the entire do group is nested.
A graph that contains nodes that are graphs, that is, a graph that contains nested subgraphs. See also flat graph.
nested message type
A message type that is contained in another message type. In some cases, only part of a message type (for example, only the mandatory fields) is nested, but this "partial" nested message type is also considered to be nested. For example, SWIFT MT 195 could be used to request information about a SWIFT MT 100 (customer transfer). The SWIFT MT 100 (or at least its mandatory fields) is then nested in SWIFT MT 195.
A savepoint that is included or positioned within another savepoint. Nested savepoints allow an application to have multiple levels of savepoints active at a time and allow the application to roll back to any active savepoint as required.
A complex data type that references another complex data type. A nested type can be an array type with elements that are row or array types or can be a row type with fields that are row or array types.
- In the WebSphere MQ Administration Interface (MQAI), a means of grouping information returned from WebSphere MQ.
- A display technique that is used to show the results of a multidimensional query that returns a sub-cube. The column/row labels display the extra dimensionality of the output within the labels describing the members of each dimension.
An element in a multiple response variable that shows the number of respondents who chose one or more categories in a group of categories. A subtotal element for the same categories would show the number of responses given.
See node error table.
net available quantity
The quantity of an SKU available for new orders after taking into account the stock reservations and allocation constraints. The net available quantity is calculated as: OnHand - Pending Out.
NetBIOS (Network Basic Input/Output System)
A standard interface to networks and personal computers that is used on local area networks to provide message, print-server, and file-server functions. Application programs that use NetBIOS do not have to handle the details of LAN data link control (DLC) protocols. See also basic input/output system.
See network identifier.
See network identifier.
NETID backbone average distance
In NetDA/2, the average path length (number of hops) in the set of shortest paths between backbone nodes in a NETID subnetwork. If more than one shortest path exists between two backbone nodes, only one of these paths is included in the set of shortest paths for calculation of the average.
See network map.
See network mask.
net present value (NPV)
The estimated monetary value of an investment based on expected returns and expected costs, where these expected returns and expenses are discounted by a rate that reflects inflation and opportunity costs.
A component of Infoprint Server that provides the capability for an installation to automatically direct VTAM application data targeted for a network printer to the JES spool without changing the VTAM applications. From the JES spool, the data can be printed on a JES or PSF printer or sent to another location for printing.
In Tivoli NetView for OS/390, a set of application programming interfaces (APIs) that enable Tivoli NetView for OS/390 to interact with various types of databases in the OS/390 environment.
NetView command authorization table
In the NetView program, a set of entries that define an operator's access restrictions to commands, and depending on the level of granularity that a customer chooses to instate, to command keywords and keyword values. See also command authorization.
See NetView Distribution Manager.
See network log.
NetView-NetView task (NNT)
In Tivoli NetView for OS/390, the task under which a cross-domain NetView operator session runs. See also operator station task.
NetWare managed site
In a Tivoli environment, a resource that represents (a) a Novell NetWare server on which the Tivoli NetWare repeater is installed and (b) one or more clients. A NetWare managed site enables profiles to be distributed through the NetWare server to one or more specified client PCs using either TCP/IP or IPX.
network accessible unit (NAU)
See network addressable unit.
network access server (NAS)
A device that functions as an access control point for users in remote locations who connect to an internal network or to an ISP. A NAS might include its own authentication services or rely on a separate authentication server. A NAS can be a dedicated server or a software service within a regular server.
- An identifier for a node in a network, for example an IP address. See also host name, IP address.
- In SNA networking, an address that consists of subarea and element fields and identifies a link, link station, or network addressable unit.
- In NCS, a unique identifier (within an address family) for a specific host on a network or an internet. The network address is sufficient to identify a host, but does not identify a communication end point within the host.
Network Address Translation (NAT)
In a firewall, the conversion of secure Internet Protocol (IP) addresses to external registered addresses. This enables communications with external networks but masks the IP addresses that are used inside the firewall.
- The conversion of a network address that is assigned to a logical unit in one network into an address in an adjacent network. See also alias address, real address, static network address translation.
- In a firewall, the conversion of secure Internet Protocol (IP) addresses to external registered addresses. This enables communications with external networks but masks the IP addresses that are used inside the firewall.
A logical extended agent used to create dependencies between jobs and job streams on separate Tivoli Workload Scheduler networks. See also internetwork dependency.
network application program
In the IBM Token-Ring Network, a program that is used to connect and communicate with adapters on a network, enabling users to perform application-oriented activities and to run other application programs.
network-attached storage file server (NAS file server)
A dedicated storage device with an operating system that is optimized for file-serving functions. A NAS file server can have the characteristics of both a node and a data mover.
- Control information about the communications environment. System name and default local location name are examples of network attributes. See also system value.
- A property of a network that describes whether the network is IP based or non-IP based.
network authentication service
The i5/OS implementation of the Kerberos V5 standard protocol that enables the System i product and several System i services (such as IBM System i5 Access for Windows) to use for authentication a Kerberos ticket as an optional replacement for a user name and password.
Network Basic Input/Output System
- An object class that is used for symbols that represent compound objects that might contain objects such as hosts and network devices. See also connector class.
- The type of TCP/IP network, such as Class A, Class B, or Class C.
The component that displays telecommunication networks in the form of topological or geographical views. See also handler.
The use of a scalable distributed computing infrastructure that encompasses the key elements of networking technologies. Examples are systems and network management; the Internet and intranets; clients and servers; application programs, databases; transaction processing; and various operating systems and communication protocols.
Network Computing Kernel (NCK)
In the Network Computing System (NCS), the combination of the remote procedure call (RPC) runtime library and the Location Broker, which provide the function necessary required to run distributed applications.
Network Computing System (NCS)
A set of software tools that conform to the Network Computing Architecture. These tools include the Remote Procedure Call runtime library, the Location Broker, and the NIDL compiler.
A concentrator and protocol converter that is used with SDLC links. By converting protocols, which manage the way that data is sent and received, the IBM 3710 Network Controller enables the use of non-SNA devices with an SNA host processor.
network control mode
The mode in which a network control program can direct a communication controller to perform such activities as polling, device addressing, dialing, and answering. See also emulation mode.
- A program used for requests and responses exchanged between physical units in a network for data flow control.
- A program that controls the operation of a communication controller. See also emulation program.
The act of updating the topology database of all attached routing nodes to reflect the addition, deletion, or changes to the reachability and metrics of a network resource. The updating is accomplished through the exchange of topology messages.
Network Database System (NDB)
The part of TCP/IP that uses the remote procedure call (RPC) protocol to allow interoperability among a variety of workstation users and a mainframe relational database system. It provides access to a mainframe relational database from workstations and mainframes and allows users to issue SQL statements interactively, or to invoke NDB services from within a C application program. NDB services can then be used to pass SQL statements to a DB2 or SQL/DS system and to handle responses from the DB2 or SQL/DS system.
Network Data Management Protocol (NDMP)
A protocol that allows a network storage-management application to control the backup and recovery of an NDMP-compliant file server, without installing vendor-acquired software on that file server.
network data-transfer rate
A rate that is calculated by dividing the total number of bytes that are transferred by the data transfer time. For example, this rate can be the time that is spent transferring data over a network.
network delivery notification
A delivery notification that conforms to the network protocol. See also application delivery notification.
network directory database
See distributed directory database.
A program that allows two or more computers or work stations to interoperate over a communications network. The computers or work stations may be heterogeneous or homogeneous devices. Services provided by a network driver can include file sharing, remote database access, electronic mail, remote print services, time services, security services, data conversion, remote function call, and work station emulation.
network driver for Microsoft Windows
In System i Access, a program that integrates System i Access functions with the standard user interface in the Microsoft Windows program. The Windows network driver allows a Windows user to redirect print files to a System i server (using the virtual print function), manage these redirected printer files (using Windows Print Manager), and use remote System i server files (using the shared folders function).
- In the Simple Network Management Protocol (SNMP), a gateway, router, or host that contains management agents responsible for performing the network management functions requested by the network management stations.
- Any shelf-based telecom or data communication equipment, outside plant equipment, or peripheral equipment. Network elements are predefined business objects.
network entity title
In OSI, a title that identifies the network entity on a given node. Because a node can have only one network entity, the network entity title uniquely identifies a given node. Network entity titles are represented in the same format as NSAP addresses.
In object distribution, a file (either a physical file or a save file) sent by one user to one or more other users. A network file is placed on the recipient's message queue when it arrives at the destination system.
network gateway accounting (NGA)
The Tivoli NetView Performance Monitor subsystem that receives traffic information from the gateway network control program (NCP) for sessions that flow throughout a network.
In Backup, Recovery, and Media Services, a cluster of systems sharing a common media inventory. Available tapes are eligible for use by any system in the network group. Each system in the network group receives updates to the media inventory, regardless of which network member makes the change.
See network identifier.
- In TCP/IP, that part of the IP address that defines a network. The length of the network ID depends on the type of network class (A, B, or C).
- A single character that is placed before a message type to indicate which network is to be used to send the message; for example, S for SWIFT.
- The network ID that is assigned by IMS or CICS, or if the connection type is RRSAF, the RRS unit of recovery ID (URID).
- A set of protocols, developed by Sun Microsystems, that are used to provide directory services for network information.
- A distributed database that is used to maintain consistent configuration files throughout a network.
network information services
A set of UNIX network services (for example, a distributed service for retrieving information about the users, groups, network addresses, and gateways in a network) that resolve naming and addressing differences among computers in a network.
An open, highly modular framework for networking support using industry-wide standards. The Networking Blueprint (a) incorporates multiple protocols and multiple vendor components; (b) enables comprehensive systems management and application choices independent of the network; and (c) facilitates the support of new technologies.
Networking Broadband Services (NBBS)
An IBM architecture for high-speed networking that complements the asynchronous transfer mode (ATM) standards and provides access services, transport services, and network control for user traffic.
Rules for using communication lines. Protocols can identify the direction of data flow, where data begins and ends, how much data is being transmitted, and whether data or control information is being sent. The two protocols that JES3 uses to establish a networking environment are binary synchronous communication (BSC) and systems network architecture (SNA).
- The software that formats packets at the network layer into packets that specific network adapters can understand and transmit. See also communication interface, network interface attribute.
- The physical interface that allows a user to connect to the integrated services digital network (ISDN).
network interface attribute
A property of a network interface. Network interface attributes include IP label or IP address and a function, such as service, nonservice, or persistent. See also network interface.
network interface card (NIC)
A printed circuit board that plugs into a personal computer, server, or workstation. It controls the exchange of data over a network and provides the electronic functions for the data-link protocol or access method, such as token ring or Ethernet.
Network Interface Definition Language (NIDL)
A declarative language for the definition of interfaces that has two forms, a Pascal-like syntax and a C-like syntax. NIDL is a component of the Network Computing Architecture.
network interface description
An i5/OS communications object that represents the physical interface to the integrated services digital network (ISDN). The network interface description must be configured in addition to the line, controller, and device descriptions. The system-recognized identifier for the object type is *NWID.
- In object distribution, an entry in the network job table that specifies the system action required for incoming network jobs sent by a particular user or group of users. Each entry is identified by the user ID of the originating user or group.
- A facility for linking single-processor systems or multi-access spool complexes into a processing network
A file that contains (a) messages, commands, and command procedures that have been processed by monitoring and management software and (b) output resulting from commands, command procedures, and other activity occurring within monitoring and management software.
Network Logical Data Manager (NLDM)
A program that collects and interprets records of errors detected in a network and suggests possible solutions. NLDM consists of commands and data services processors that comprise the Netview software monitor component.
- The process of planning, organizing, and controlling a communications-oriented system.
- The conceptual control element of a data station that interfaces with all of the layers of that data station and is responsible for the setting and resetting control parameters, obtaining reports of error conditions, and determining if the station should be connected to or disconnected from the medium.
- In OSI, systems management that involves processing and exchanging management information over two or more nodes. Network management provides the ability to manage one or more nodes from another node.
network management association
In OSI, an ACSE association between two systems management application entities (SMAEs)--one representing a managing process, the other representing an agent process. After network management associations are established, a manager can send operator commands to its agents and an agent can send event reports to its managers.
network management domain
In OSI, a manager and the agents that it manages. An agent can participate in more than one network management domain. In OSI Communications Subsystem, the agent at a local node is always part of the management domain of the manager at that local node.
network management vector transport (NMVT)
A management services request/response unit (RU) that flows over an active session between physical unit management services and control point management services (SSCP-PU session). See also control point management services unit, multiple-domain support message unit.
network map (netmap)
A configuration file that defines the nodes in the network and the communication information of the nodes. See also guided node discovery.
network mask (netmask)
A number that is the same as an Internet Protocol (IP) address. A network mask identifies which part of an address is to be used for an operation, such as making a TCP/IP connection. See also IP address takeover.
See network QOS mode.
- A name that identifies the server in the network. The network name is comprised of the communication protocol and server name.
- See uninterpreted name.
- In SNA, a symbolic name by which end users refer to a network addressable unit (NAU), a link station, or a link. See also ACB name.
- A node that can define the paths or routes, control route selection, and handle directory services for the APPN function.
- An APPN network node that provides network services for its local logical units and adjacent end nodes.
- A network node that is directly connected to an end node or a low-entry networking end node, and has been assigned to service the end node session requests.
- A group of predefined settings that can be shared among multiple network access policy rules to control traffic flow, communication, and access between hosts, segments, or subnets on a network.
- An entry in the Network Installation Management (NIM) database that represents a local area network.
network operations center (NOC)
Any center that has responsibility for the operational aspects of a production network. Examples of NOC tasks are monitoring and control, troubleshooting, and user assistance.
A person who controls the day to day operation of all or part of a network. See also domain operator.
In System i Access, the system, path, or library, and the name of the server network driver, network printer, or data queue that the user is accessing. For example, the network path used to access a printer through the network driver is: //system/library/printer.
Network Printer Manager (NPM)
An application that lets network administrators monitor, control, and configure IBM network printers. NPM also lets network administrators monitor some aspects of printers controlled by PSF and other manufacturers' network printers that comply with RFC 1759.
Network Problem Determination Application (NPDA)
A program that collects and interprets records of errors detected in a network and suggests possible solutions. NPDA consists of commands and data services processors that comprise the Netview hardware monitor component.
network QOS mode (network mode)
In the OSI Communications Subsystem licensed program, a set of X.25 connection-mode quality-of-service (QOS) values that determine the type of connection established between two nodes.
In SNA, a name that uniquely identifies a specific resource, such as a logical unit (LU) or control point (CP), within a specific network. A network-qualified name consists of a network identifier and a resource name, each of which is a symbol string that is 1 to 8 bytes.
Network Routing Facility
A licensed program that runs under the control of the Network Control Program and uses a System/370 backbone network. The network routing facility provides primary logical unit support and a path for data between a display station and an application without using the System/370 host system.
An automated process that discovers hardware devices, such as computer and printers, that exist in a network. Network scan results include details of the discovered devices, including IP addresses and device names. See also scan, software scan.
- The protection of a network from malicious activity through monitoring, collecting, and analyzing network activities.
- Software that is responsible for authenticating end users and authorizing them to access network resources, such as IBM Tivoli Access Manager. See also credential mapper.
- The endpoint of a network connection used by the SWIFT transport layer.
- The point at which network services are provided by a network entity to a transport entity according to the OSI reference model. NSAP addresses are assigned by a hierarchy of registration authorities so that each valid NSAP address provides a globally unambiguous identification of one system. One system can have multiple NSAP addresses.
network services header
In SNA, a 3-byte field in a function management data (FMD) request/response unit (RU) flowing in an SSCP-LU, SSCP-PU, or SSCP-SSCP session. The network services header is used primarily to identify the network services category of the request unit (RU) (for example, configuration services and session services) and the particular request code within a category.
network session accounting (NSA)
The Tivoli NetView Performance Monitor subsystem that receives session accounting information from the network control program (NCP) for sessions that flow throughout a network.
Network Status Manager (NSM)
A service used by Network File System (NFS) when using version 2 or 3 of the NFS protocol to determine whether resources, such as file open share or byte range locks, are still in use by a remote client.
network table file
A text file that contains the system-specific configuration information for each node in a Content Manager system. Each node in the system must have a network table file that identifies the node and lists the nodes that it needs to connect to. The name of a network table is FRNOLINT.TBL.
network termination 1 (NT1)
In ISDN, an end point for the network's transmission line. Network termination 1 is responsible for the physical layer characteristics (of the OSI reference model), such as ending the line transmission, monitoring performance, and timing.
network termination 2 (NT2)
In ISDN, an end point for the network's transmission line. Network termination 2 is responsible for the network layer, the data link layer, and the remaining functions of the physical layer (not included in network termination 1) of the OSI reference model. Examples include communications controllers and public branch exchanges (PBXs).
- The representation of the current topology of the intermediate routing portion of the APPN network. The network topology database contains entries for network nodes and the transmission groups interconnecting them. Each entry describes the current characteristics of the node or transmission group that it represents. The topology database is used to determine the preferred session route between two end nodes for a given class of service.
- In Managed System Services, a set of database files that contain topology information and general system information for nodes throughout the network.
In DCE Remote Procedure Call (RPC), a type defined in an interface definition and referred to in a represent_as clause that is converted into a local type for manipulation by application code.
network user identification (NUI)
In X.25, the network specific information that enables the transmitting data terminal equipment (DTE) to provide billing, security, or management information on a per-call basis to the data circuit-terminating equipment (DCE). The NUI can identify a network user independently of the port being used.
network virtual terminal (NVT)
A Telnet service that provides a default common interface to remote terminals. The client application negotiates NVT support and, as a result, the Telnet server maps 5250 functions to virtual terminal characters.
A mathematical model for predicting or classifying cases by using a complex mathematical scheme that simulates an abstract version of brain cells. A neural network is trained by presenting it with a large number of observed cases, one at a time, and allowing it to update itself repeatedly until it learns the task. See also Kohonen network.
In the GDDM function, one of the colors selected to display graphics primitives; for example, white on a display or black on a printer. See also background color.
- The normal mode of operation that exists after successful completion of a version-to-version migration. At this stage, all new functions of the new version are available for use. A DB2 data sharing group cannot coexist with members that are still at the prior version level, and fallback to a prior version is not supported. See also conversion mode, conversion mode*, enabling-new-function mode, enabling-new-function mode*.
- An installation mode of QMF that permits QMF owner and object names to be as long as the database allows.
For the purposes of the Globalization White Paper: any product that is undergoing substantial changes in architecture or design or where more than 50% of the code will be new or rewritten. A product that is made up of other existing products with a small amount of integration code is not considered to be a new product.
The periodic transfer of newly posted newsgroup articles from one NNTP server to another using the NNTP protocol. Enabling the NNTP protocol on a Domino server allows you to set up a newsfeed to transfer both USENET and private newsgroup articles.
An online discussion group that users with newsreaders can participate in. A Domino NNTP server can store Usenet newsgroups, public newsgroups distributed on the Internet, and private newsgroups.
A single entry in a Really Simple Syndication (RSS) compatible format. It can include a headline, text, and a link to more information. A news item task in an agent can be used to create news items for display in a Cognos Connection portlet.
See Non-Facility Associated Signaling.
See near field communication.
See Network File System.
An NFS configuration in which one node is both the NFS server for one file system and the NFS client for another file system, while a second node is the NFS client for the first file system and the NFS server for the second file system. Each node is part of a mutual takeover or active-active cluster configuration, both providing and mounting an NFS file system.
See network gateway accounting.
See node initialization block.
- In the OSI Communications Subsystem licensed program, a 1- to 8-character name that identifies an object or entity in an OSI network. Nicknames are provided by OSI Communications Subsystem to enable users to use simple names instead of the often long, multipart, sometimes binary-coded identifiers required by OSI protocols.
- In a federated system, an identifier that is used in a distributed request to refer to a data source object. See also data source object.
- An alternative name, often derived from other name elements, for a personal name.
- See alias.
See Network Interface Definition Language.
See Network Installation Management.
An AIX system that can install one or more Network Installation Manager (NIM) clients. An AIX system must be defined as a NIM master before any NIM clients can be defined on that system. A NIM master manages the configuration database, which contains information for the NIM clients. In CSM, the NIM master is the management server.
The information that defines which networks in the NIM environment can communicate with each other and which gateways they use to facilitate that communication. NIM routing is used to represent the TCP/IP routine that exists for the LANs in the overall network environment.
See nucleus initialization program.
See Network Information Service.
See node information table.
See network job entry.
See node loop port.
See national language dependent function.
See Network Logical Data Manager.
See national language feature.
See Network Lock Manager.
See National Motor Freight Classification code.
See National Motor Freight Classification council.
See network management gateway.
See network management station.
See network management vector transport.
See network node.
See network node control point.
See NetView-NetView task.
See Network News Transfer Protocol.
See network operations center.
- An element of a graph or hierarchy that can be connected by links. A graph consists of a finite set of nodes connected by a finite set of links. In drawings, nodes are often displayed as boxes and links are often displayed as lines.
- Any element in a tree.
- In XML, the smallest unit of a valid, complete structure in a document.
- A grouping of processor, memory, and I/O hub hardware resources in the system. On systems of machine type FHA, a node is a processor book. On systems of machine type MMA, a node is a drawer.
- An individual operating-system image within a cluster. Depending on the way in which the computer system is partitioned, it may contain one or more nodes.
- In hardware, a uniprocessor or symmetric multiprocessor (SMP) computer that is part of a clustered system or a massively parallel processing (MPP) system. See also symmetric multiprocessing system.
- Any computer system that has a parallel engine installed on it. See also parallel engine.
- An IMS resource that represents a physical VTAM terminal. The node is represented by a VTAM terminal control block.
- An object in the tree view that serves as a container to hold related objects.
- The start and end points, various stages, and decision points through which a document type passes in a workflow.
- See database partition.
- A file server or workstation on which the backup-archive client program has been installed, and which has been registered to the server.
- In X.25, a point where packets are received, stored, and forwarded to another location (or data terminal equipment) according to a routing method defined for the network.
- One of the various artifacts in an application as shown in the application diagram. Each node is given a label based on its underlying source artifact or object name.
- An endpoint or junction used in a message flow. See also message flow node.
- A UML model element that represents the computational resources of a system, such as personal computers, sensors, printing devices, or servers.
- One of the points in a topology view or topology diagram. A node usually corresponds to a machine, but depending on the type of view, might also correspond to a facility, base product, solution element, or solution artifact.
- A computer location defined in a network.
- In Systems Network Architecture (SNA), the portion of a hardware component, along with its associated software components, that implements the functions of the seven architectural layers.
- See attribute definition.
- In Enterprise Service Tools, one of a series of graphical elements in a flow diagram. A node represents an endpoint or junction used in a flow.
- A complete implementation of Sterling Commerce Center, which includes a Windows messaging server that is integrated with communications components, a processing engine, and primary and secondary systems.
- In networking, a point capable of sending and receiving data. A node can be a device, such as printer or workstation, a system, or a storage location on a disk. See also port.
- The graphical representation of a data operation in a stream. Different types of nodes have different shapes to indicate the type of operation that they perform. See also downstream, stream.
- In the context of an index for a database, an ordered group of key values having a fixed number of elements. A B-tree for example, is a set of nodes that contain keys and pointers arranged in a hierarchy. See also branch node, leaf node, root node.
- A single machine or machine partition with a unique IP address on which you install one or more WebSphere Commerce components. In a federated environment, a node is a single occurrence of WebSphere Application Server and its applications. A node in a cell may or may not be running the same enterprise application as other nodes in the same cell.
- In communications, an end point of a communication link or a junction common to two or more links in a network. Nodes can be processors, communication controllers, cluster controllers, terminals, or workstations. Nodes can vary in routing and other functional capabilities.
- One operating system image.
- In Microsoft Cluster Server (MSCS), each computer in the cluster.
- In a graphing tool, a specific data element that is connected to other data elements by lines or edges.
- An instance of one of the node kinds that are defined by the XQuery and XPath data model. See also item, node kind, XQuery and XPath data model.
- A location in a communications network that provides host-processing services.
- A single processing unit within a system. For redundancy, nodes are deployed in pairs to make up a system.
- A choice point in a binary search tree.
- In a network configuration, the physical machine that contains one or more related functional units.
- A logical group of managed servers. See also managed node.
- An instance of Sterling Connect:Direct.
- In a network, a point at which one or more functional units connect channels or data circuits.
- A point in a transaction topology that represents an application, component, or server whose transaction interactions are tracked and aggregated by Transaction Tracking.
- A logical processing unit that is defined in a configuration file by a virtual name and a set of associated details about the physical resources, such as the server, the disks, its pools, and so on.
- A Fibre Channel device that contains a node port (N_port) or node loop port (NL_port).
- An organization that represents a physical location whether it is a manufacturing plant, small stock room, or warehouse.
See node definition file.
A node event that occurs when a node leaves the cluster voluntarily or fails. See also cluster event.
An object that transforms business objects other than links into representation objects that are instances of IlpNetworkNode. See also link factory.
- A collection of application server nodes that defines a boundary for server cluster formation.
- Nodes having similar attribute values and defined as a group to facilitate node management.
See node identifier.
- A unique string of characters that identifies the node on a network.
- In a tree-like representation of XML instance documents, a unique pointer to a specific node. A node ID can also point to a node that is generated by a constructor.
node ID index
See XML node ID index.
node initialization block (NIB)
In VTAM, a control block associated with a particular node or session that contains information used by the application program to identify the node or session and to indicate how communication requests on a session are to be handled by VTAM.
The complete loss of communication between two or more parts of the cluster. Node isolation occurs if a global network is not defined and all TCP/IP-based networks that connect cluster nodes fail. A cluster that experiences node isolation is referred to as a partitioned cluster.
A designation that defines a node according to the data that the node contains. The XQuery and XPath data model defines the following node kinds: document, element, attribute, text, processing instruction, and comment. See also node, processing instruction.
node-level policy group
One or more policies, or one or more simple policy groups, or both, that are of the same scope and that are associated with a particular node in a policy hierarchy. See also node-attached policy group, simple policy group.
- The nodes assigned to participate in the takeover of a given resource group. See also resource group.
- A system object that contains a list of SNA nodes identified by an APPN network ID and control point name. The system-recognized identifier for the object type is *NODL.
node loop port (NL_port)
A port specific to Fibre Channel Arbitrated Loop (FC-AL). An NL_port has the same functional, logical, and message handling capability as a node port (N_port), but connects to an arbitrated loop rather than to a fabric. In some implementations, ports can function either as N_ports or as NL_ports depending on the network to which they are connected. An NL_port must replicate frames and pass them on when in passive loop mode. See also arbitrated loop, Nx_port.
- The name assigned to a node during network definition.
- An 8-character alphanumeric name that represents a node to other parts of the network job entry (NJE) network.
- The machine name or host name that must be unique.
- A unique name that is used to identify a workstation, file server, or PC to the server.
node port (N_port)
A port that connects a node to a fabric or to another node. An N_port connects to a fabric port (F_port) or to the N_port of another node. An N_port handles creation, detection, and flow of message units to and from the connected systems. N_ports are end points in point-to-point links. See also Nx_port.
node priority policy
A user-selected method that is used to determine the node order for takeover of a nonconcurrent resource group. The node priority policy can be the order of the participating node list, or can be a dynamic node priority policy that uses an RSCT Resource Monitoring and Control (RMC) resource attribute. See also resource group policies, takeover priority.
node privilege class
A privilege class that gives an administrator the authority to remotely access backup-archive clients for a specific client node or for all clients in a policy domain. See also privilege class.
node switchboard (NSB)
A configuration of switches for node-to-switch communication. See also intermediate switch board.
Internal communication between clustered nodes uses the virtual Ethernet as the private network (or interconnect) that carries the heartbeat. The cluster service on each node uses a heartbeat to keep track of the current state of the nodes within the cluster. The cluster service uses the heartbeat to: (1) Determine when a failover to another node should occur, (2) Synchronize the cluster databases on each node, (3) Verify node failures during a cluster configuration change. The private network uses the single network virtual Ethernet model.
The designation of a node according to the protocols it supports or the role it plays in a network. Examples of Advanced Peer-to-Peer Networking (APPN) node types are network node and end node.
A node event that occurs when a node joins or rejoins a cluster. See also cluster event.
A storage control block containing the currently active NOERROR definitions, specifying a list of error codes that are treated as normal completion codes for job-tracking purposes. The controller builds the NOERROR table at startup.
- Random variations of the characteristics of any entity, such as voltage, current, or data.
- A disturbance that affects a signal and potentially distorts the information carried by that signal.
A set of terms, acronyms, icons, or other symbols appearing on keys, switches, and labels. An example of nomenclature is the Alt label that appears on the alternate shift key on some keyboards. The padlock symbol (which is an icon or metaphor of Shift lock), the various arrows, and Attn (for the command Attention), are other examples of keyboard nomenclature used in IBM. ISO/IEC Standard 9995:1993 defines 56 symbols which cover most keyboard nomenclature requirements without the need for translation.
nonadjacent destination node
In the OSI Communications Subsystem licensed program, a destination node that is connected to a different subnetwork from the local node. To communicate with a nonadjacent destination node requires the use of a relay node. See also adjacent destination node.
A tape volume profile that RACF creates when tape data set protection is not active. RACF does not delete the profile unless specified to do so. See also automatic profile.
A way of requesting a service over an interface so that if the request cannot be completed immediately, the requesting process is able to continue and is not suspended. See also blocking mode.
An operation, such as sending or receiving a message, that returns immediately whether or not the operation is completed. For example, a nonblocking receive will not wait until a message arrives. A nonblocking receive must be completed by a later test or wait.
See required space.
In LANs, a format for the transmission of medium access control (MAC) addresses for token-ring adapters. In noncanonical format, the most significant (leftmost) bit of each address byte is transmitted first. See also canonical address.
- A binary value that is not repeatable by a generating program over a long period of time. It can be a counter or a random value.
- A unique cryptographic number that is embedded in a message to help detect a replay attack.
- A random, unique text string that is encrypted along with data and then is used to detect attacks against the system that sends the encrypted data. A nonce is used especially for authentication and ensures that encrypted data is different each time that it is encrypted.
noncomplete CCD table
In SQL replication, a CCD table that is initially empty and has rows appended to it as changes are made to the replication source. See also complete CCD table.
nonconcurrent resource group
A resource group that does not have the startup policy Online on All Available Nodes. See also concurrent resource group, resource group, resource group policies, shared IP address.
noncondensed CCD table
In SQL replication, a CCD table that can contain more than one row for each key value. These duplicate rows represent the history of changes for the values in the rows of a table. See also condensed CCD table, consistent-change-data table.
See delta backup.
A user-defined function that returns a single group of values (one row of data) and therefore does not require a cursor when it is executed. Compare with cursor function. See also cursor function.
See noncustomer identifier.
non-defect oriented problem (NDOP)
A type of PMR that does not result in an APAR, because it is not caused by a program defect. The analysis of NDOPs can help identify common user errors, usability problems, and documentation errors.
nondelimited ASCII format
A file format that is used to import data. A nondelimited ASCII file is a sequential ASCII file with row delimiters used for data exchange with any ASCII product; column values are not separated by delimiters.
The capability of a solving engine to search for a solution by exploring many alternative possibilities without the developer knowing beforehand which of those possibilities will necessarily succeed. An engine manages the implementation of nondeterminism through choice points, restored states, reversible variables, backtracking, and so forth.
A dictionary in which there are many possible paths for a given input letter when matching a string to find a word. See also deterministic dictionary.
A user-defined function whose result is not solely dependent on the values of the input arguments. That is, successive invocation with the same argument value can produce a different answer.
The physical installation of additional units while normal operations continue. See also nondisruptive removal.
The physical removal of existing units while normal operations continue without interruption. See also nondisruptive installation.
A subscription that exists only while the connection from the subscribing application to the queue manager remains open. The subscription is removed when the subscribing application disconnects from the queue manager either deliberately or by loss of connection. See also durable subscription.
none start event
A start event that does not have a defined trigger. A none start event can be used in a descriptive process that does not require technical information or in a subprocess where the control of the process flow is passed from its parent process. See also start event.
Non-Facility Associated Signaling (NFAS)
An ISDN configuration where several T1 facilities can be controlled by a single D-channel, instead of the normal T1 configuration where each T1 facility has 23 B-channels and a D-channel (23B+D). With NFAS, all 24 timeslots of the nonsignaling trunks are available for voice whereas only 23 channels can be used on the trunk that carries signaling traffic (23B+D+n24B). See also D-channel backup.
In SNA management services (SNA/MS), alert information that is encoded such that it conveys to the receiver the set of screens that should be displayed for the network operator when the alert is received. The use of nongeneric alerts requires that the receiver recognize and understand each unique problem for which an alert is sent. See also generic alert.
A zone that is hosted by a global zone which contains an installed subset of the complete Solaris operating system software packages. Non-global zones are unaware of the existence of any other zones. See also global zone.
non-guaranteed print labeling
Some printers that do not support guaranteed print labeling can still print identification labels, but the integrity of the labels cannot be guaranteed using PSF. See also guaranteed print labeling.
A printer in which printing is not the result of mechanical impacts, for example, a thermal printer, an electrostatic printer, and a photographic printer. See also impact printer.
The work done by jobs and tasks, such as batch jobs and system activity, that may have occurred as a result of an interactive transaction. See also interactive transaction.
non-intrusive journal backup
A method of journal backup during which all DFSMShsm activity is allowed to continue while DFSMShsm creates a backup of the preexisting journal records. After the initial backup of the journal completes, all DFSMShsm activity is quiesced and DFSMShsm completes the backup of the journal. Non-intrusive journal backup can be used to reduce the impact of journal backup on DFSMShsm availability and performance. See also quiesced journal backup.
A product is non-key if and only if the following conditions are satisfied: 1. A decision has been made using the process documented in section 14.2 that the product is not flagship, key, or legacy. 2. The product is not part of another product offering which is listed in the product classification database. See also flagship product, key product, legacy product.
An alphabet comprising letters other than the Latin-based ones, such as those used in Greek and Arabic. See also Latin alphabet.
An index page that contains keys and page numbers of other pages in the index (either leaf or nonleaf pages). Nonleaf pages never point to actual data. See also leaf page.
nonlibrary user ASP
An auxiliary storage pool that contains journals, journal receivers, and save files. The libraries for the objects are in the system ASP. See also library user ASP.
- In operations research, pertaining to functions that can be represented by polynomial or quadratic equations.
- In constraint programming, pertaining to a function that is not linear. That is, it may be a quadratic polynomial, or it may be logical and symbolic in ways that cannot be easily or efficiently represented by linear equations. For example, the trigonometric functions, such as sine, cosine, tangent, and so forth, are considered nonlinear in this context.
nonlinear programming (NLP)
A technique for solving an optimization problem for which the model may contain a nonlinear objective and nonlinear constraints. Typically, the decision variables are continuous (not discrete).
An environment in which the application is responsible for generating and configuring connection factories. The Java EE server does not own or know about these connection factories and therefore provides no Quality of Service facilities.
An application program that is initiated by the submission of a batch job. This program runs in a batch message processing (BMP) region, a Java batch processing region (JBP region), or an IMS Fast Path (IFP) utility region. See also message-driven program.
non-native data format
A format of data that is written to a storage pool that differs from the format that the server uses for operations. See also native format.
- A subnetwork whose network identifier differs from the network identifier that a node uses for its own network-qualified resource names.
- In MPTN architecture, with respect to a particular transport user, a transport network whose addressing structure and transport service are different from that assumed in the design of that transport user.
- Any network attached to a gateway NCP that does not contain that NCP's resources.
nonpageable dynamic area
In MVS, an area of virtual storage whose virtual addresses are identical to real addresses. It is used for programs or parts of programs that are not to be paged during execution.
In MVS, a subdivision of the nonpageable dynamic area that is allocated to a job step or system task that is not to be paged during execution. In a nonpageable region, each virtual address is identical to its real address.
In Business Graphics Utility and the GDDM function, data that is specified such that each X-value has a set of Y-values associated with it. See also paired data.
In Fibre Channel technology, a mode in which a loop port (L_port) in a loop is inactive and cannot arbitrate or send frames, but can retransmit any received transmissions. This mode is entered if there are more than 127 devices in a loop and an arbitrated loop physical address (AL_PA) cannot be acquired. See also loop port, participating mode.
- An object that contains the index entries for all data partitions of a partitioned table. See also partitioned index.
- An index in which the leftmost columns are not the partitioning columns of the table. See also secondary index.
nonpartitioned secondary index (NPSI)
An index on a partitioned table space that is not the partitioning index and is not partitioned. See also data-partitioned secondary index.
A table that does not use data partitions. See also partitioned table.
A temporary data field that an object uses for calculations or temporary storage. See also persistent column.
A message that does not survive a restart of the queue manager. See also persistent message.
See non-program integrated information.
See control character.
A carrier that does not subscribe to Sterling TMS. Shipments can still be tendered to a nonprofiled carrier. However, the shipments are not tracked. See also offline carrier.
non-program integrated information (non-PII)
Product information that is technically and rationally separable from the product but is delivered with the product. Non-PII information is not essential to the usability of the software and includes hard copy documentation, soft copy documentation, and tutorials.
Any resource status that cannot be recovered after a terminal logoff, a user signoff, or an IMS restart. Nonrecoverable status only exists while the resource is active and is deleted when that resource becomes inactive.
A reporting attribute of a workstation that means that information is not fed back to Tivoli Workload Scheduler for z/OS. See also reporting attribute.
- In business-to-business communication the ability of the recipient to prove who sent a message based on the contents of the message. This can derive from the use of a digital signature on the message, which links the sender to the message.
- Proof that a transaction occurred or that a message was sent or received. The use of digital certificates and public key cryptography to digitally sign transactions, messages, and documents supports nonrepudiation.
nonrepudiation data repository
The repository in which copies of documents (and authentication information for signed documents) are stored in case disputes arise regarding the authenticity of document exchanges.
In IMS, a mode of terminal operation that allows asynchronous operations between the terminal operator and the application program. See also response mode.
A binary code system in which a signal condition must be sustained for the full time interval and does not revert to a standby or quiescent state between signal elements. Using NRZ permits the maximum data signaling rate on the channel, which should be twice the band width, according to Nyquist's theorem.
- Pertaining to objects created by, or actions performed by, a user without root privileges. For example, a user who installs the database server without user root privileges performs a non-root installation.
- Pertaining to objects that do not possess or require root privileges. For example, a non-root user is a user without root privileges. A non-root server is a database server that runs without root privileges.
A volume that has valid or unexpired data on it. See also scratch.
A cursor that can be moved only in a forward direction. Nonscrollable cursors are sometimes called forward-only cursors or serial cursors. See also scrollable cursor.
A set of nodes that are not controlled by a single administrative party. See also secure network.
See boot interface.
nonshared resource (NSR)
A file that has its own set of buffers and control blocks. See also local shared resource.
Non-SNA Interconnection (NSI)
An IBM licensed program that provides format identification (FID) support for selected non-SNA facilities. Thus, it allows SNA and non-SNA facilities to share SDLC links. It also allows the remote concentration of selected non-SNA devices along with SNA devices.
nonspacing character sequence
For accented characters, a two-part sequence consisting of a valid diacritic followed by an alphabetic character or a space. The system converts the sequence into a single code point that results in the alphabetic character with the specified diacritic mark.
A four-character code that is used to represent each fleet within a carrier organization. A carrier defines a nonstandard SCAC for each fleet, other than for the fleet that uses the legal SCAC of the carrier.
See dynamic connection.
A connection that does not have to be established by dialing. See also switched connection.
A connection between computers or devices that does not have to be made by dialing. See also switched line.
A type of MSDB characterized by data that is used or updated frequently, and segments that are not owned by specific logical terminals. Direct update of segment fields is allowed but no insertion or deletion of segments is permitted.
Images, static or animated visual content, or audio content that support product documentation. Examples include flowcharts, illustrations of hardware components, screen captures, diagrams and animations.
A mode of binary synchronous transmission in which all transmission control characters are treated as transmission control characters rather than as text. See also transparent mode.
A user-defined function that always returns the same value when passed the same arguments. A nonvariant function must not contain SQL statements. Compare with variant function. See also variant function.
A resource, such as user accounts, for which only one current copy is saved in Sterling B2B Integrator at any time. When a non-versioned resource is modified, the new data replaces the old data in the system.
non-VSAM data set
A data set allocated and accessed using one of the following methods: basic direct access method (BDAM), basic partitioned access method (BPAM), basic indexed sequential access method (BISAM), basic sequential access method (BSAM), queued sequential access method (QSAM), or queued indexed sequential access method (QISAM).
A catalog entry that describes a data set that does not use the Virtual Storage Access Method (VSAM). A non-VSAM entry contains the data set's volume serial number (VOLSER) and device type. If the data set resides on a magnetic tape volume, the entry can also identify the data set's file number. When the data set resides on a direct access device, the operating system obtains further information by examining the data set's data set control block (DSCB) in the volume's volume table of contents (VTOC).
non-VSAM volume record (NVR)
A VSAM volume data set (VVDS) record that contains information about a system-managed data set that does not use the Virtual Storage Access Method (VSAM) and is not related to the storage management subsystem (SMS).
non-working days calendar
A calendar assigned to a job stream to represent the non-working days, when job streams and jobs are not to be run. It can also be used to designate Saturdays or Sundays, or both, as workdays. See also calendar, holidays calendar.
One of two ways to display a message panel. NOPROMPT mode is only intended for experienced SWIFT Link users who are familiar with the structure of SWIFT messages. With NOPROMPT mode, only the SWIFT header, trailer, and pre-filled fields and their tags are displayed. See also PROMPT mode.
In SNA, a value in the form-of-response-requested field of the request header that directs the receiver of the request not to return any response, regardless of whether or not the request is received and processed successfully. See also definite response, exception response.
normal disconnected mode (NDM)
A nonoperational mode of an unbalanced data link in which the secondary station is logically disconnected from the data link and, therefore, cannot transmit or receive information.
- In SNA, a data flow designated in the transmission header (TH) that is used primarily to carry end-user data. The rate at which requests flow on the normal flow can be regulated by session-level pacing. Normal and expedited flows move in both the primary-to-secondary and secondary-to-primary directions. See also expedited flow.
- All sequence flow paths in a process except those paths that originate from an intermediate event that is attached to the boundary of an activity. See also exception flow.
A process in which the i5/OS operating system contained on tape is installed in auxiliary storage, replacing the operating system (if any) that is currently in the system. See also abbreviated installation.
- The process of restructuring a data model by reducing its relations to their simplest forms. It is a key step in the task of building a logical relational database design. Normalization helps avoid redundancies and inconsistencies in data. An entity is normalized if it meets a set of constraints for a particular normal form (first normal form, second normal form, and so on). See also denormalization, repeating group.
- The process of replacing surface form representations with their canonical form. This may include case normalization, where a capitalized word is replaced by a lowercase word: 'Run' becomes 'run'; grammatical normalization, where an inflected verb is replaced by the non-inflected form: 'runs' becomes 'run'; lexicographical normalization, where Unicode full-width characters is replaced with Unicode basic form, or white spaces are removed from Chinese text.
To put data in a physical location and structure that is optimized for quick input and the storage of large amounts of data. See also denormalize.
See multiuser mode.
The priority assigned to a transaction when the number of transactions enqueued and waiting to be processed is less than the limit count value. See also limit count, limit priority, scheduling priority.
In SNADS, a queue that contains distribution entries with a service level of data low. See also priority queue.
normal response mode (NRM)
An operational mode of an unbalanced data link in which the secondary station starts transmission only as the result of receiving explicit permission, by polling, from the primary station. See also asynchronous balanced mode.
normal speed carrier service
A service that delivers products within a regular or typical interval of time. However, the interval of time that categories a service as regular or typical may vary from one service provider to another.
- In Communications Manager/2, stopping communications after current functions (for example, file transfer) have completed.
- One of two ways to stop an attachment. If the attachments or any of their connections are in a pending state, SNA Server rejects the normal stop attachment action.
normal transition link
In a collaboration template activity diagram, the line that represents the path between a successfully executed node for an action, subactivity, or iterator and the next node. See also exception transition link, transition link.
For IBM business, legal, marketing, or organizational contexts, the administrative region comprising Germany, the United Kingdom, Ireland, some parts of Africa, Nordic countries, CEMA, Switzerland, Austria and some countries in the Middle East. See also Central Europe, Middle East, and Africa, Europe, Middle East, and Africa, Southwest Europe.
See Notes object services.
In binary floating-point and decimal floating-point concepts, a value, not interpreted as a mathematical value, that contains a mask and a sequence of digits. See also decimal floating-point number.
- A system of characters, symbols, or abbreviated expressions used to express technical facts or qualities.
- An XML construct that contains a note, a comment or an explanation about information in an XML file. A notation can be used to associate a binary description with an entity or attribute.
not deterministic function
See non-deterministic function.
A simple data structure that stores Notes database design elements (forms, views, and so on), user-created data (documents), and administrative information, such as the database access control list.
A structure that contains, among other things, the note's originator ID (OID), which includes the note's universal ID (UNID); the note ID; the note's parent note, if one exists; the number of items in the note; and the list of the note's item descriptors.
A 4-byte value that is assigned to a note when the note is first created. Note IDs are stored in the record relocation vector table, which maps a note's note ID to the position with the database file. A note ID is unique within a database but not across replicas of the database, meaning that the same note in two replicas can have different note IDs, even though the replicas have identical UNIDs.
A single file that physically contains both a set of documents and a copy of the application design elements that control the creation and modification of those documents. A database can be shared, local, or remote.
A security mechanism that verifies that the user or Domino server trying to access a particular Domino server has a trusted certificate in common with it. Authentication occurs in both directions: the server authenticates the user; then the user authenticates the server.
Notes named network
A group of Domino servers that run on the same LAN protocol -- for example, servers running on TCP/IP in one of an organization's locations. Servers on the same Notes named network route mail to each other automatically, whereas you need a Connection document to route mail between servers on different Notes named networks.
Notes name service
The name service within Lotus Notes and Domino that assists in name-to-address resolution in NRPC (Notes remote procedure call) by making calls to the Domino Directory to resolve Domino common names to their respective protocol names.
Notes object services (NOS)
A set of portable C/C++ functions that create and access information in databases and files, compile and interpret formulas and scripts, and provide an interface to operating systems in a consistent, portable way.
Application software that runs on a machine that is connected to a network. The Notes server provides the following services to Notes clients and other Notes servers: storage and replication of databases, directory services, mail routing, and security.
Pertaining to a type, or characteristic, of a procedure or user-defined function that is defined to run in the database manager process. When this type of object is run (using the not fenced clause), the database manager is not protected from changes made by this object. See also fenced.
- A text or HTML message that is sent to an individual or user according to a particular task or event that either requires the participation of the individual or is purely informational. See also contract event.
- Information, labeled as a managed object, that relates to an event that has occurred within the managed object.
- The process of notifying the shipping node, vendor, or service provider when fulfilling an order request.
- A message that contains the event descriptions that are sent to managed resources, web services and other resources.
- An occurrence within a process that can trigger an action. Notifications can be used to model conditions of interest to be transmitted from a sender to a (typically unknown) set of interested parties (the receivers).
- A user-configured e-mail, page, alert message, or Notification Type Process Control event that is initiated by the Audit Notification System when a specified error message is generated.
- An unscheduled, spontaneously generated message, issued by an agent when a significant or critical (data) condition occurs.
- The basis for the notification messages sent during the lifecycle of a contract or at defined events. See also template.
- A template that defines the content and format of the email sent to an access group on the occurrence of a specific event.
A message queue, a data area, or a database file that contains information identifying the last successful commitment operation. This information can be used by the programmer to find a restarting point for an application following an abnormal end to the system or routing step processing.
- An external trace that contains information pertaining to the releasing and checkpointing of data sets by PSF.
- A PSF subcomponent that returns processed data sets to JES or Direct Printer Services Subsystem and performs checkpoint processing on data sets as they are printed.
Pertaining to a status where all images in the image catalog are not available for use by the virtual optical device. The status of the individual image catalog entry images in the image catalog reflects either the last status for the catalog before being made not ready from ready or the future status for catalogs about to be made ready. The image catalog can be made not ready by using the LODIMGCLG command with OPTION(*UNLOAD).
See deterministic function.
See network performance analysis logical unit.
Pertaining to a class of computational problems for which no efficient solution algorithm has been found. Many significant computer science problems, including many graph layout problems, belong to this class.
See network-layer protocol data unit.
See Network Print Facility.
See N-Port ID Virtualization.
See Network Printer Manager.
See nonprocess runout.
See net present value.
See negative response.
See network routing facility.
See normal response mode.
A typesetting utility originally designed to drive Teletype model 37 printing workstations. It now drives a wide variety of backspacing and non-backspacing tty-type line printers and tty-emulating printers.
See Notes Remote Procedure Call.
See network services.
See network session accounting.
See network service access point.
In OSI, an address that identifies a service access point in the network layer. NSAP addresses must be unique within the OSI network where they are used. NSAP addresses are assigned by naming authorities.
See node switchboard.
See Network Shared Disk.
See Nistevo Standard Delimited File.
See network-layer service data unit.
See National Science Foundation.
See National Science Foundation Network.
NSI profile attribute
In DCE Remote Procedure Call (RPC), an RPC-defined attribute (NSI attribute) of a name service entry that stores a collection of RPC profile elements and identifies the entry as an RPC profile.
See Network Status Manager.
See nonshared resource.
See notify subtask.
See network termination.
See network termination 1.
See network termination 2.
See New Technology File System.
See national terminal number.
See Network Time Protocol.
In a Tivoli environment, the first Windows NT machine on which the Tivoli Remote Execution Service is installed. Using fanout, the NT repeater distributes the Tivoli Remote Execution Service to all other NT clients during the client installation process.
See NCP/Token-Ring interconnection.
See National Television Standard Committee.
The specifications for color television as defined by the NTSC committee, which include: (a) 525 scan lines, (b) broadcast bandwidth of 4 MHz, (c) line frequency of 15.75 KHz, (d) frame frequency of 30 frames per second, and (e) color subcarrier frequency of 3.58 MHz. See also phase alternation line.
See network terminating unit.
See network user address.
- That portion of a control program that always remains in central storage.
- That portion of the CICS region that holds the CSA, management modules, control tables, and resident application programs.
A MERVA component that processes a service request as selected by the request queue handler. The service a nucleus server provides and the way it provides it is defined in the nucleus server table (DSLNSVT).
See network user identification.
NUI service facility
In X.25, a facility sent by the data terminal equipment (DTE) to the network in call setup packets that contain a network-assigned identifier, which can be used for billing, security, or network management purposes. The NUI service facility can also be used to select specific optional facilities to be associated with a virtual call.
See null character.
- In the C language, a single character that denotes the end of a string.
- In SQL, the value denoting the absence of data for a particular row and column.
- In the C and C++ languages, a pointer that does not point to a data object.
- A control character with the value of X'00' that represents the absence of a displayed or printed character. See also numeric space, space.
- A control character used to delimit a string of characters.
- A character that is used for media-fill or time-fill. Null characters may be inserted into, or removed from, a data stream without affecting the information content of that stream, but such action may affect the information layout and the control of equipment.
A type of credential that is usually associated with diskless workstations. Because there is no repository of information that is local to the workstation, it is not possible to obtain identifying information.
See modem eliminator.
The value that is obtained by converting the number 0 into a pointer; for example, (void *) 0. The C and C++ languages guarantee that this value will not match that of any legitimate pointer, so it is used by many functions that return pointers to indicate an error.
- A statement that consists of a semicolon.
- A statement that contains only the delimiter symbol, but no characters.
- A string containing no element.
- A character or bit string with a length of zero.
In C, the value that indicates the end of a string. For EBCDIC, ASCII, and Unicode UTF-8 strings, the null terminator is a single-byte value (X'00'). For Unicode UTF-16 and UCS-2 (wide) strings, the null terminator is a double-byte value (X'0000').
- A word or symbol that expresses either quantity (cardinal) or order (ordinal). Many cultures have different forms for cardinal and ordinal numbers. For example in French the cardinal number five is cinq, but the ordinal fifth is cinquième or 5eme or 5e. Numbers are written with symbols which are usually referred to as numerals. See also Arabic numeral, Chinese numeral, Hindi numeral, Roman numeral.
- In REXX, a character string consisting of one or more decimal digits optionally preceded by a plus or minus sign, and optionally including a single period that represents a decimal point. A number can also have a power of 10 suffix in conventional exponential notation: an E (uppercase or lowercase) followed optionally by a plus or minus sign then followed by one or more decimal digits defining the power of 10.
numeric character reference
See character entity reference.
- A constant that expresses an integer, a real number, or a complex number.
- The actual numeric value to be used in processing, instead of the name of a field containing the data. A numeric constant can contain any of the numeric digits 0 through 9, a sign (plus or minus), and a decimal point. See also character constant.
- A constant that specifies a number for a column value in a column map or relationship. See also numeric expression.
A numeric constant, a simple numeric variable, a scalar reference to a numeric array, a numeric-valued function reference, or a sequence of the above, separated by numeric operators and parentheses. See also numeric constant.
An area that is reserved for a particular unit of information and that can contain only the digits 0 through 9. See also character field.
numeric grid question
A question that ties together a group of related subquestions that share a category list and that require numeric responses. For example, a question that asks respondents to enter the amount that they spent on various products in the last four months. The subquestions are “Amount spent in May,” “Amount spent in April,” and so on, and the categories are the product names.
A set of keys grouped in a special position (usually the right hand side) of a keyboard, or as a separate attachment to the keyboard. The numeric key pad is used to enter numeric data (see ISO/IEC 9995-4).
A space equal in pitch to the width of the numeric characters in a string in which it is imbedded. It has an IBM GCGID of SP31. In ISO/IEC 10646 and Unicode, this is called figure space. See also null character, required space, space.
See nonuniform rational B-spline.
See non-VSAM volume record.
See nonvolatile random access memory.
See network virtual terminal.
See network interface.
See nonprogrammable workstation.
See network server description.